summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/content-security-policy/unsafe-eval/eval-in-iframe.html
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:22:09 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:22:09 +0000
commit43a97878ce14b72f0981164f87f2e35e14151312 (patch)
tree620249daf56c0258faa40cbdcf9cfba06de2a846 /testing/web-platform/tests/content-security-policy/unsafe-eval/eval-in-iframe.html
parentInitial commit. (diff)
downloadfirefox-43a97878ce14b72f0981164f87f2e35e14151312.tar.xz
firefox-43a97878ce14b72f0981164f87f2e35e14151312.zip
Adding upstream version 110.0.1.upstream/110.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/content-security-policy/unsafe-eval/eval-in-iframe.html')
-rw-r--r--testing/web-platform/tests/content-security-policy/unsafe-eval/eval-in-iframe.html49
1 files changed, 49 insertions, 0 deletions
diff --git a/testing/web-platform/tests/content-security-policy/unsafe-eval/eval-in-iframe.html b/testing/web-platform/tests/content-security-policy/unsafe-eval/eval-in-iframe.html
new file mode 100644
index 0000000000..bca5decd25
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/unsafe-eval/eval-in-iframe.html
@@ -0,0 +1,49 @@
+<!DOCTYPE html>
+<html>
+
+<head>
+ <title>eval-in-iframe</title>
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/utils.js"></script>
+</head>
+
+<body>
+ <p>This test checks that the CSP of calleeRealm only (and not of
+ the callerRealm) is checked for allowing eval.</p>
+ <script>
+ let tests = [
+ { "directive": "script-src", "csp": "script-src 'unsafe-inline'" },
+ { "directive": "default-src", "csp": "default-src 'unsafe-inline'" },
+ ];
+
+ tests.forEach(test => {
+ let child = document.createElement('iframe');
+ child.src = '/content-security-policy/unsafe-eval/support' +
+ '/echo-eval-with-policy.py?policy=' + encodeURIComponent(test.csp);
+ document.body.appendChild(child);
+ let msg = new Promise(resolve => {
+ window.addEventListener('message', e => {
+ if (e.source == child.contentWindow)
+ resolve(e.data);
+ });
+ });
+
+ promise_test(async t => {
+ assert_equals((await msg).evalInIframe, "blocked");
+ }, `(${test.directive}) Eval code should not execute ` +
+ `from iframe in iframe`);
+ promise_test(async t => {
+ assert_equals((await msg).evalInParent, "allowed");
+ }, `(${test.directive}) Eval code should execute ` +
+ `from iframe in parent`);
+ promise_test(async t => {
+ assert_throws_js(child.contentWindow.EvalError, _ =>
+ child.contentWindow.eval('1+1'));
+ }, `(${test.directive}) Eval code should not execute ` +
+ `from parent in iframe`);
+ });
+ </script>
+</body>
+
+</html>