1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
|
<!DOCTYPE HTML>
<html>
<head>
<title>Bug 808292 - Implement path-level host-source matching to CSP</title>
<!-- Including SimpleTest.js so we can use waitForExplicitFinish !-->
<script src="/tests/SimpleTest/SimpleTest.js"></script>
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
</head>
<body>
<p id="display"></p>
<div id="content" style="visibility: hidden">
<iframe style="width:100%;" id="testframe"></iframe>
</div>
<script class="testbody" type="text/javascript">
SimpleTest.waitForExplicitFinish();
/* Description of the test:
* We are loading the following url (including a fragment portion):
* http://test1.example.com/tests/dom/security/test/csp/file_path_matching.js#foo
* using different policies and verify that the applied policy is accurately enforced.
*/
var policies = [
["allowed", "*"],
["allowed", "http://*"], // test for bug 1075230, enforcing scheme and wildcard
["allowed", "test1.example.com"],
["allowed", "test1.example.com/"],
["allowed", "test1.example.com/tests/dom/security/test/csp/"],
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js"],
["allowed", "test1.example.com?foo=val"],
["allowed", "test1.example.com/?foo=val"],
["allowed", "test1.example.com/tests/dom/security/test/csp/?foo=val"],
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js?foo=val"],
["allowed", "test1.example.com#foo"],
["allowed", "test1.example.com/#foo"],
["allowed", "test1.example.com/tests/dom/security/test/csp/#foo"],
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js#foo"],
["allowed", "*.example.com"],
["allowed", "*.example.com/"],
["allowed", "*.example.com/tests/dom/security/test/csp/"],
["allowed", "*.example.com/tests/dom/security/test/csp/file_path_matching.js"],
["allowed", "test1.example.com:80"],
["allowed", "test1.example.com:80/"],
["allowed", "test1.example.com:80/tests/dom/security/test/csp/"],
["allowed", "test1.example.com:80/tests/dom/security/test/csp/file_path_matching.js"],
["allowed", "test1.example.com:*"],
["allowed", "test1.example.com:*/"],
["allowed", "test1.example.com:*/tests/dom/security/test/csp/"],
["allowed", "test1.example.com:*/tests/dom/security/test/csp/file_path_matching.js"],
["blocked", "test1.example.com/tests"],
["blocked", "test1.example.com/tests/dom/security/test/csp"],
["blocked", "test1.example.com/tests/dom/security/test/csp/file_path_matching.py"],
["blocked", "test1.example.com:8888/tests"],
["blocked", "test1.example.com:8888/tests/dom/security/test/csp"],
["blocked", "test1.example.com:8888/tests/dom/security/test/csp/file_path_matching.py"],
// case insensitive matching for scheme and host, but case sensitive matching for paths
["allowed", "HTTP://test1.EXAMPLE.com/tests/"],
["allowed", "test1.EXAMPLE.com/tests/"],
["blocked", "test1.example.com/tests/dom/security/test/CSP/?foo=val"],
["blocked", "test1.example.com/tests/dom/security/test/csp/FILE_path_matching.js?foo=val"],
]
var counter = 0;
var policy;
function loadNextTest() {
if (counter == policies.length) {
SimpleTest.finish();
}
else {
policy = policies[counter++];
var src = "file_testserver.sjs?file=";
// append the file that should be served
src += (counter % 2 == 0)
// load url including ref: example.com#foo
? escape("tests/dom/security/test/csp/file_path_matching.html")
// load url including query: example.com?val=foo (bug 1147026)
: escape("tests/dom/security/test/csp/file_path_matching_incl_query.html");
// append the CSP that should be used to serve the file
src += "&csp=" + escape("default-src 'none'; script-src " + policy[1]);
document.getElementById("testframe").addEventListener("load", test);
document.getElementById("testframe").src = src;
}
}
function test() {
try {
document.getElementById("testframe").removeEventListener('load', test);
var testframe = document.getElementById("testframe");
var divcontent = testframe.contentWindow.document.getElementById('testdiv').innerHTML;
is(divcontent, policy[0], "should be " + policy[0] + " in test " + (counter - 1) + "!");
}
catch (e) {
ok(false, "ERROR: could not access content in test " + (counter - 1) + "!");
}
loadNextTest();
}
loadNextTest();
</script>
</body>
</html>
|