File: server-initiated.window.js

package info (click to toggle)
firefox 144.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,637,504 kB
  • sloc: cpp: 7,576,692; javascript: 6,430,831; ansic: 3,748,119; python: 1,398,978; xml: 628,810; asm: 438,679; java: 186,194; sh: 63,212; makefile: 19,159; objc: 13,086; perl: 12,986; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 53; csh: 10
file content (118 lines) | stat: -rw-r--r-- 5,052 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
// META: script=/common/get-host-info.sub.js
// META: script=helper.js

// The following tests verify server-initiated integrity checks which validate
// signatures even in the absence of integrity metadata asserted by the client.

// A canonically validly signed response, generated using the steps at
// https://wicg.github.io/signature-based-sri/#examples, relying on the test
// key from https://www.rfc-editor.org/rfc/rfc9421.html#name-example-ed25519-test-key:
//
// ```
// NOTE: '\' line wrapping per RFC 8792
//
// HTTP/1.1 200 OK
// Date: Tue, 20 Apr 2021 02:07:56 GMT
// Content-Type: application/json
// Unencoded-Digest: sha-256=:X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=:
// Content-Length: 18
// Signature-Input: signature=("unencoded-digest";sf); \
//                  keyid="JrQLj5P/89iXES9+vFgrIy29clF9CC/oPPsw3c5D0bs="; \
//                  tag="sri"
// Signature: signature=:TUznBT2ikFq6VrtoZeC5znRtZugu1U8OHJWoBkOLDTJA2FglSR34Q \
//                       Y9j+BwN79PT4H0p8aIosnv4rXSKfIZVDA==:
//
// {"hello": "world"}
// ```

// Valid metadata from the response above:
const kRequestWithValidSignature = {
  body: `{"hello": "world"}`,
  digest: `sha-256=:X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=:`,
  signature: `signature=:gHim9e5Pk2H7c9BStOmxSmkyc8+ioZgoxynu3d4INAT4dwfj5LhvaV9DFnEQ9p7C0hzW4o4Qpkm5aApd6WLLCw==:`,
  signatureInput: `signature=("unencoded-digest";sf);keyid="${kValidKeys['rfc']}";tag="sri"`
};
generate_fetch_test(kRequestWithValidSignature,
                    {},
                    EXPECT_LOADED,
                    "Valid signature, same-origin: loads.");
generate_fetch_test(kRequestWithValidSignature,
                    {
                      origin: get_host_info().REMOTE_ORIGIN,
                      mode: "cors",
                    },
                    EXPECT_BLOCKED,
                    "Valid signature, cross-origin w/o cors, cors: blocked (because of CORS).");

// Valid metadata for a response sending CORS headers:
const kRequestWithValidSignatureAndCORS = {
  body: kRequestWithValidSignature['body'],
  digest: kRequestWithValidSignature['digest'],
  signature: kRequestWithValidSignature['signature'],
  signatureInput: kRequestWithValidSignature['signatureInput'],
  cors: true,
};
generate_fetch_test(kRequestWithValidSignatureAndCORS,
                    {},
                    EXPECT_LOADED,
                    "Valid signature, same-origin w/ cors: loads.");
generate_fetch_test(kRequestWithValidSignatureAndCORS,
                    {
                      origin: get_host_info().REMOTE_ORIGIN,
                      mode: "cors",
                    },
                    EXPECT_LOADED,
                    "Valid signature, cross-origin w/cors, mode: cors: loads.");

// Incorrect signature, no cors:
const kRequestWithInvalidSignature = {
  body: kRequestWithValidSignature['body'],
  digest: kRequestWithValidSignature['digest'],
  signature: `signature=:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==:`,
  signatureInput: kRequestWithValidSignature['signatureInput'],
};
generate_fetch_test(kRequestWithInvalidSignature,
                    {},
                    EXPECT_BLOCKED,
                    "Invalid signature, same-origin: blocked.");
generate_fetch_test(kRequestWithInvalidSignature,
                    {
                      origin: get_host_info().REMOTE_ORIGIN,
                      mode: "no-cors",
                    },
                    EXPECT_BLOCKED,
                    "Invalid signature, cross-origin w/o cors, mode: no-cors: blocked.");
generate_fetch_test(kRequestWithInvalidSignature,
                    {
                      origin: get_host_info().REMOTE_ORIGIN,
                      mode: "cors",
                    },
                    EXPECT_BLOCKED,
                    "Invalid signature, cross-origin w/o cors, cors: blocked.");

// Incorrect signature, cors:
const kRequestWithInvalidSignatureAndCORS = {
  body: kRequestWithValidSignature['body'],
  digest: kRequestWithValidSignature['digest'],
  signature: kRequestWithInvalidSignature['signature'],
  signatureInput: kRequestWithValidSignature['signatureInput'],
  cors: true,
};
generate_fetch_test(kRequestWithInvalidSignatureAndCORS,
                    {},
                    EXPECT_BLOCKED,
                    "Invalid signature, same-origin w/ cors: blocked.");
generate_fetch_test(kRequestWithInvalidSignatureAndCORS,
                    {
                      origin: get_host_info().REMOTE_ORIGIN,
                      mode: "no-cors",
                    },
                    EXPECT_BLOCKED,
                    "Invalid signature, cross-origin w/ cors, mode: no-cors: blocked.");
generate_fetch_test(kRequestWithInvalidSignatureAndCORS,
                    {
                      origin: get_host_info().REMOTE_ORIGIN,
                      mode: "cors",
                    },
                    EXPECT_BLOCKED,
                    "Invalid signature, cross-origin w/ cors, mode: cors: blocked.");