summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/content-security-policy/style-src-attr-elem
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /testing/web-platform/tests/content-security-policy/style-src-attr-elem
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/content-security-policy/style-src-attr-elem')
-rw-r--r--testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-attr-allowed-src-blocked.html24
-rw-r--r--testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-attr-blocked-src-allowed.html27
-rw-r--r--testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-allowed-attr-blocked.html33
-rw-r--r--testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-allowed-src-blocked.html27
-rw-r--r--testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-blocked-attr-allowed.html33
-rw-r--r--testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-blocked-src-allowed.html30
6 files changed, 174 insertions, 0 deletions
diff --git a/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-attr-allowed-src-blocked.html b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-attr-allowed-src-blocked.html
new file mode 100644
index 0000000000..567e22496c
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-attr-allowed-src-blocked.html
@@ -0,0 +1,24 @@
+<!DOCTYPE html>
+<html>
+
+<head>
+ <meta http-equiv="Content-Security-Policy" content="style-src-attr 'unsafe-inline';
+ style-src 'none';">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script>
+ var t = async_test("Should apply the style attribute");
+ window.addEventListener('securitypolicyviolation', t.unreached_func("Should not have fired a spv event"));
+ </script>
+</head>
+
+<body style="background: green">
+ <script>
+ t.step(function() {
+ assert_true(document.body.style.length > 0);
+ t.done();
+ });
+ </script>
+</body>
+
+</html>
diff --git a/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-attr-blocked-src-allowed.html b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-attr-blocked-src-allowed.html
new file mode 100644
index 0000000000..622c3bf764
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-attr-blocked-src-allowed.html
@@ -0,0 +1,27 @@
+<!DOCTYPE html>
+<html>
+
+<head>
+ <meta http-equiv="Content-Security-Policy" content="style-src-attr 'none';
+ style-src 'unsafe-inline';">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script>
+ var t = async_test("Should fire a security policy violation event");
+ window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) {
+ assert_equals(e.violatedDirective, 'style-src-attr');
+ assert_equals(e.blockedURI, 'inline');
+ }));
+ </script>
+</head>
+
+<body style="background: green">
+ <script>
+ async_test(function(test) {
+ assert_equals(document.body.style.length, 0);
+ test.done();
+ }, "The attribute style should not be applied");
+ </script>
+</body>
+
+</html>
diff --git a/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-allowed-attr-blocked.html b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-allowed-attr-blocked.html
new file mode 100644
index 0000000000..279600ea2e
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-allowed-attr-blocked.html
@@ -0,0 +1,33 @@
+<!DOCTYPE html>
+<html>
+
+<head>
+ <meta http-equiv="Content-Security-Policy" content="style-src-elem 'unsafe-inline';
+ style-src-attr 'none';">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script>
+ var t = async_test("Should fire a security policy violation for the attribute");
+ window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) {
+ assert_equals(e.violatedDirective, 'style-src-attr');
+ assert_equals(e.blockedURI, 'inline');
+ }));
+ </script>
+</head>
+
+<body style="background: green">
+ <style>
+ body {background: blue;}
+ </style>
+
+ <script>
+ async_test(function(test) {
+ assert_equals(document.body.style.length, 0);
+ assert_equals(document.styleSheets.length, 1);
+ test.done();
+ }, "The attribute style should not be applied and the inline style should be applied");
+ </script>
+
+</body>
+
+</html>
diff --git a/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-allowed-src-blocked.html b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-allowed-src-blocked.html
new file mode 100644
index 0000000000..c15cf0bcf6
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-allowed-src-blocked.html
@@ -0,0 +1,27 @@
+<!DOCTYPE html>
+<html>
+
+<head>
+ <meta http-equiv="Content-Security-Policy" content="style-src-elem 'unsafe-inline';
+ style-src 'none';">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script>
+ var t = async_test("Inline style should be applied");
+ window.addEventListener('securitypolicyviolation', t.unreached_func("Should not have fired a spv event"));
+ </script>
+</head>
+
+<body>
+ <style>
+ body {background: green;}
+ </style>
+ <script>
+ t.step(function() {
+ assert_equals(document.styleSheets.length, 1);
+ t.done();
+ });
+ </script>
+</body>
+
+</html>
diff --git a/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-blocked-attr-allowed.html b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-blocked-attr-allowed.html
new file mode 100644
index 0000000000..a42c9de9b8
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-blocked-attr-allowed.html
@@ -0,0 +1,33 @@
+<!DOCTYPE html>
+<html>
+
+<head>
+ <meta http-equiv="Content-Security-Policy" content="style-src-elem 'none';
+ script-src-attr 'unsafe-inline'">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script>
+ var t = async_test("Should fire a security policy violation for the inline block");
+ window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) {
+ assert_equals(e.violatedDirective, 'style-src-elem');
+ assert_equals(e.blockedURI, 'inline');
+ }));
+ </script>
+</head>
+
+<body style="background: green">
+ <style>
+ body {background: blue;}
+ </style>
+
+ <script>
+ async_test(function(test) {
+ assert_true(document.body.style.length > 0);
+ assert_equals(document.styleSheets.length, 0);
+ test.done();
+ }, "The inline style should not be applied and the attribute style should be applied");
+ </script>
+
+</body>
+
+</html>
diff --git a/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-blocked-src-allowed.html b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-blocked-src-allowed.html
new file mode 100644
index 0000000000..bf5014a458
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/style-src-attr-elem/style-src-elem-blocked-src-allowed.html
@@ -0,0 +1,30 @@
+<!DOCTYPE html>
+<html>
+
+<head>
+ <meta http-equiv="Content-Security-Policy" content="style-src-elem 'none';
+ style-src 'unsafe-inline';">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script>
+ var t = async_test("Should fire a security policy violation event");
+ window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) {
+ assert_equals(e.violatedDirective, 'style-src-elem');
+ assert_equals(e.blockedURI, 'inline');
+ }));
+ </script>
+</head>
+
+<body>
+ <style>
+ body {background: green;}
+ </style>
+ <script>
+ async_test(function(test) {
+ assert_equals(document.styleSheets.length, 0);
+ test.done();
+ }, "The inline style should not be applied");
+ </script>
+</body>
+
+</html>