1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89
|
// META: script=/common/get-host-info.sub.js
// META: script=helper.js
// A canonically validly signed response, generated using the steps at
// https://wicg.github.io/signature-based-sri/#examples, relying on the test
// key from https://www.rfc-editor.org/rfc/rfc9421.html#name-example-ed25519-test-key:
//
// ```
// NOTE: '\' line wrapping per RFC 8792
//
// HTTP/1.1 200 OK
// Date: Tue, 20 Apr 2021 02:07:56 GMT
// Content-Type: application/json
// Unencoded-Digest: sha-256=:X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=:
// Content-Length: 18
// Signature-Input: signature=("unencoded-digest";sf); \
// keyid="JrQLj5P/89iXES9+vFgrIy29clF9CC/oPPsw3c5D0bs="; \
// tag="sri"
// Signature: signature=:TUznBT2ikFq6VrtoZeC5znRtZugu1U8OHJWoBkOLDTJA2FglSR34Q \
// Y9j+BwN79PT4H0p8aIosnv4rXSKfIZVDA==:
//
// {"hello": "world"}
// ```
// Unsigned responses are blocked when integrity is asserted:
generate_fetch_test({},
{integrity: `ed25519-!!!`},
EXPECT_LOADED,
"No signature, malformed integrity check: loads.");
generate_fetch_test({},
{integrity: `ed25519-${kValidKeys['rfc']}`},
EXPECT_BLOCKED,
"No signature, valid integrity check: blocked.");
// Valid signatures depend upon integrity checks.
const kRequestWithValidSignature = {
body: `{"hello": "world"}`,
digest: `sha-256=:X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=:`,
signature: `signature=:gHim9e5Pk2H7c9BStOmxSmkyc8+ioZgoxynu3d4INAT4dwfj5LhvaV9DFnEQ9p7C0hzW4o4Qpkm5aApd6WLLCw==:`,
signatureInput: `signature=("unencoded-digest";sf);keyid="${kValidKeys['rfc']}";tag="sri"`
};
generate_fetch_test(kRequestWithValidSignature,
{integrity:"ed25519-???"},
EXPECT_LOADED,
"Valid signature, malformed integrity check: loads.");
generate_fetch_test(kRequestWithValidSignature,
{integrity:`ed25519-${kValidKeys['rfc']}`},
EXPECT_LOADED,
"Valid signature, matching integrity check: loads.");
generate_fetch_test(kRequestWithValidSignature,
{integrity:`ed25519-${kInvalidKey}`},
EXPECT_BLOCKED,
"Valid signature, mismatched integrity check: blocked.");
generate_fetch_test(kRequestWithValidSignature,
{integrity:`ed25519-${kValidKeys['rfc']} ed25519-${kInvalidKey}`},
EXPECT_LOADED,
"Valid signature, one valid integrity check: loads.");
// Invalid signatures are all blocked.
const kRequestWithInvalidSignature = {
body: `{"hello": "world"}`,
digest: `sha-256=:X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=:`,
signature: `signature=:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==:`,
signatureInput: `signature=("unencoded-digest";sf);keyid="${kValidKeys['rfc']}";tag="sri"`
};
generate_fetch_test(kRequestWithInvalidSignature,
{integrity:"ed25519-???"},
EXPECT_BLOCKED,
"Invalid signature, malformed integrity check: blocked.");
generate_fetch_test(kRequestWithInvalidSignature,
{integrity:`ed25519-${kValidKeys['rfc']}`},
EXPECT_BLOCKED,
"Invalid signature, matching integrity check: blocked.");
generate_fetch_test(kRequestWithInvalidSignature,
{integrity:`ed25519-${kInvalidKey}`},
EXPECT_BLOCKED,
"Invalid signature, mismatched integrity check: blocked.");
generate_fetch_test(kRequestWithInvalidSignature,
{integrity:`ed25519-${kValidKeys['rfc']} ed25519-${kInvalidKey}`},
EXPECT_BLOCKED,
"Invalid signature, one valid integrity check: blocked.");
|