blob: 1e47b643a6ce7b21b7f175ab0661f0690ee4253b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
|
/*
* The policy for this test is:
* Content-Security-Policy: default-src 'self'
*/
function createAllowedEvent() {
/*
* Creates a new EventSource using 'http://mochi.test:8888'. Since all mochitests run on
* 'http://mochi.test', a default-src of 'self' allows this request.
*/
var src_event = new EventSource(
"http://mochi.test:8888/tests/dom/security/test/csp/file_bug802872.sjs"
);
src_event.onmessage = function(e) {
src_event.close();
parent.dispatchEvent(new Event("allowedEventSrcCallbackOK"));
};
src_event.onerror = function(e) {
src_event.close();
parent.dispatchEvent(new Event("allowedEventSrcCallbackFailed"));
};
}
function createBlockedEvent() {
/*
* creates a new EventSource using 'http://example.com'. This domain is not allowlisted by the
* CSP of this page, therefore the CSP blocks this request.
*/
var src_event = new EventSource(
"http://example.com/tests/dom/security/test/csp/file_bug802872.sjs"
);
src_event.onmessage = function(e) {
src_event.close();
parent.dispatchEvent(new Event("blockedEventSrcCallbackOK"));
};
src_event.onerror = function(e) {
src_event.close();
parent.dispatchEvent(new Event("blockedEventSrcCallbackFailed"));
};
}
addLoadEvent(createAllowedEvent);
addLoadEvent(createBlockedEvent);
|