summaryrefslogtreecommitdiffstats
path: root/dom/security/test/csp/test_path_matching.html
blob: a54de0a25cf795c8509f79eabdb51502ab6d330a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
<!DOCTYPE HTML>
<html>
<head>
  <title>Bug 808292 - Implement path-level host-source matching to CSP</title>
  <!-- Including SimpleTest.js so we can use waitForExplicitFinish !-->
  <script src="/tests/SimpleTest/SimpleTest.js"></script>
  <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
</head>
<body>
  <p id="display"></p>
  <div id="content" style="visibility: hidden">
    <iframe style="width:100%;" id="testframe"></iframe>
  </div>

<script class="testbody" type="text/javascript">

SimpleTest.waitForExplicitFinish();

/* Description of the test:
 * We are loading the following url (including a fragment portion):
 * http://test1.example.com/tests/dom/security/test/csp/file_path_matching.js#foo
 * using different policies and verify that the applied policy is accurately enforced.
 */

var policies = [
  ["allowed", "*"],
  ["allowed", "http://*"], // test for bug 1075230, enforcing scheme and wildcard
  ["allowed", "test1.example.com"],
  ["allowed", "test1.example.com/"],
  ["allowed", "test1.example.com/tests/dom/security/test/csp/"],
  ["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js"],

  ["allowed", "test1.example.com?foo=val"],
  ["allowed", "test1.example.com/?foo=val"],
  ["allowed", "test1.example.com/tests/dom/security/test/csp/?foo=val"],
  ["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js?foo=val"],

  ["allowed", "test1.example.com#foo"],
  ["allowed", "test1.example.com/#foo"],
  ["allowed", "test1.example.com/tests/dom/security/test/csp/#foo"],
  ["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js#foo"],

  ["allowed", "*.example.com"],
  ["allowed", "*.example.com/"],
  ["allowed", "*.example.com/tests/dom/security/test/csp/"],
  ["allowed", "*.example.com/tests/dom/security/test/csp/file_path_matching.js"],

  ["allowed", "test1.example.com:80"],
  ["allowed", "test1.example.com:80/"],
  ["allowed", "test1.example.com:80/tests/dom/security/test/csp/"],
  ["allowed", "test1.example.com:80/tests/dom/security/test/csp/file_path_matching.js"],

  ["allowed", "test1.example.com:*"],
  ["allowed", "test1.example.com:*/"],
  ["allowed", "test1.example.com:*/tests/dom/security/test/csp/"],
  ["allowed", "test1.example.com:*/tests/dom/security/test/csp/file_path_matching.js"],

  ["blocked", "test1.example.com/tests"],
  ["blocked", "test1.example.com/tests/dom/security/test/csp"],
  ["blocked", "test1.example.com/tests/dom/security/test/csp/file_path_matching.py"],

  ["blocked", "test1.example.com:8888/tests"],
  ["blocked", "test1.example.com:8888/tests/dom/security/test/csp"],
  ["blocked", "test1.example.com:8888/tests/dom/security/test/csp/file_path_matching.py"],

  // case insensitive matching for scheme and host, but case sensitive matching for paths
  ["allowed", "HTTP://test1.EXAMPLE.com/tests/"],
  ["allowed", "test1.EXAMPLE.com/tests/"],
  ["blocked", "test1.example.com/tests/dom/security/test/CSP/?foo=val"],
  ["blocked", "test1.example.com/tests/dom/security/test/csp/FILE_path_matching.js?foo=val"],
]

var counter = 0;
var policy;

function loadNextTest() {
  if (counter == policies.length) {
    SimpleTest.finish();
  }
  else {
    policy = policies[counter++];
    var src = "file_testserver.sjs?file=";
    // append the file that should be served
    src += (counter % 2 == 0)
               // load url including ref: example.com#foo
             ? escape("tests/dom/security/test/csp/file_path_matching.html")
               // load url including query: example.com?val=foo (bug 1147026)
             : escape("tests/dom/security/test/csp/file_path_matching_incl_query.html");

    // append the CSP that should be used to serve the file
    src += "&csp=" + escape("default-src 'none'; script-src " + policy[1]);

    document.getElementById("testframe").addEventListener("load", test);
    document.getElementById("testframe").src = src;
  }
}

function test() {
  try {
    document.getElementById("testframe").removeEventListener('load', test);
    var testframe = document.getElementById("testframe");
    var divcontent = testframe.contentWindow.document.getElementById('testdiv').innerHTML;
    is(divcontent, policy[0], "should be " + policy[0] + " in test " + (counter - 1) + "!");
  }
  catch (e) {
    ok(false, "ERROR: could not access content in test " + (counter - 1) + "!");
  }
  loadNextTest();
}

loadNextTest();

</script>
</body>
</html>