File: csp-inner.html

package info (click to toggle)
firefox 149.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,767,760 kB
  • sloc: cpp: 7,416,064; javascript: 6,752,859; ansic: 3,774,850; python: 1,250,473; xml: 641,578; asm: 439,191; java: 186,617; sh: 56,634; makefile: 18,856; objc: 13,092; perl: 12,763; pascal: 5,960; yacc: 4,583; cs: 3,846; lex: 1,720; ruby: 1,002; php: 436; lisp: 258; awk: 105; sql: 66; sed: 53; csh: 10; exp: 6
file content (37 lines) | stat: -rw-r--r-- 1,032 bytes parent folder | download | duplicates (18)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
<!DOCTYPE html>
  <script src="utils.js"></script>

  <style>
    body {background-color: red;}
  </style>

  <title>Fenced frame content to test Content Security Policies</title>

  <body>
    <script>
      const [csp_key] = parseKeylist();

      function fail() {
        writeValueToServer(csp_key,
          "FAIL: img-src policy was not honored in fenced frame");
      }

      function pass() {
        // The parent page is going to attempt to pass a
        // style-src: 'none' CSP to the fenced frame. Make sure that
        // the header is not honored.
        const bgcolor = window.getComputedStyle(document.body, null)
                        .getPropertyValue('background-color');

        if (bgcolor != "rgb(255, 0, 0)") {
          writeValueToServer(csp_key,
            "FAIL: style-src policy was passed to fenced frame");
          return;
        }

        writeValueToServer(csp_key, "pass");
      }
    </script>
    <img src="csp.png" id="my_img" onload="fail();" onerror="pass();">
  </body>
</html>