Chromium Code Reviews| Index: third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp |
| diff --git a/third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp b/third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..b3a07fb6677a7e0694c0357db605b5681fb02091 |
| --- /dev/null |
| +++ b/third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp |
| @@ -0,0 +1,156 @@ |
| +// Copyright 2016 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "core/frame/csp/CSPDirectiveList.h" |
| + |
| +#include "core/frame/csp/ContentSecurityPolicy.h" |
| +#include "core/frame/csp/SourceListDirective.h" |
| +#include "platform/network/ContentSecurityPolicyParsers.h" |
| +#include "platform/network/ResourceRequest.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +namespace blink { |
| + |
| +class CSPDirectiveListTest : public ::testing::Test { |
| +public: |
| + CSPDirectiveListTest() |
| + : csp(ContentSecurityPolicy::create()) |
| + { |
| + } |
| + |
| + CSPDirectiveList* createList(const char* list, ContentSecurityPolicyHeaderType type) |
| + { |
| + Vector<UChar> characters; |
| + String(list).appendTo(characters); |
| + const UChar* begin = characters.data(); |
| + const UChar* end = begin + characters.size(); |
| + |
| + return CSPDirectiveList::create(csp, begin, end, type, ContentSecurityPolicyHeaderSourceHTTP); |
| + } |
| + |
| +protected: |
| + Persistent<ContentSecurityPolicy> csp; |
| +}; |
| + |
| +TEST_F(CSPDirectiveListTest, IsMatchingNoncePresent) |
| +{ |
| + struct TestCase { |
| + const char* list; |
| + const char* nonce; |
| + bool expected; |
| + } cases[] = { |
| + { "script-src 'self'", "yay", false }, |
| + { "script-src 'self'", "boo", false }, |
| + { "script-src 'nonce-yay'", "yay", true }, |
| + { "script-src 'nonce-yay'", "boo", false }, |
| + { "script-src 'nonce-yay' 'nonce-boo'", "yay", true }, |
| + { "script-src 'nonce-yay' 'nonce-boo'", "boo", true }, |
| + |
| + // Falls back to 'default-src' |
| + { "default-src 'nonce-yay'", "yay", true }, |
| + { "default-src 'nonce-yay'", "boo", false }, |
| + { "default-src 'nonce-boo'; script-src 'nonce-yay'", "yay", true }, |
| + { "default-src 'nonce-boo'; script-src 'nonce-yay'", "boo", false }, |
| + |
| + // Unrelated directives do not affect result |
| + { "style-src 'nonce-yay'", "yay", false }, |
| + { "style-src 'nonce-yay'", "boo", false }, |
|
estark
2016/06/02 18:57:31
Maybe a test case or two for empty and null string
Mike West
2016/06/04 06:30:56
Added it into the `for` loop, as these should alwa
|
| + }; |
| + |
| + for (const auto& test : cases) { |
| + // Report-only |
| + Member<CSPDirectiveList> policy = createList(test.list, ContentSecurityPolicyHeaderTypeReport); |
| + Member<SourceListDirective> scriptSrc = policy->operativeDirective(policy->m_scriptSrc.get()); |
| + EXPECT_EQ(test.expected, policy->isMatchingNoncePresent(scriptSrc, test.nonce)); |
| + |
| + // Enforce |
| + policy = createList(test.list, ContentSecurityPolicyHeaderTypeEnforce); |
| + scriptSrc = policy->operativeDirective(policy->m_scriptSrc.get()); |
| + EXPECT_EQ(test.expected, policy->isMatchingNoncePresent(scriptSrc, test.nonce)); |
| + } |
| +} |
| + |
| +TEST_F(CSPDirectiveListTest, AllowScriptFromSourceNoNonce) |
| +{ |
| + struct TestCase { |
| + const char* list; |
| + const char* url; |
| + bool expected; |
| + } cases[] = { |
| + { "script-src https://example.com", "https://example.com/script.js", true }, |
| + { "script-src https://example.com/", "https://example.com/script.js", true }, |
| + { "script-src https://example.com/", "https://example.com/script/script.js", true }, |
| + { "script-src https://example.com/script", "https://example.com/script.js", false }, |
| + { "script-src https://example.com/script", "https://example.com/script/script.js", false }, |
| + { "script-src https://example.com/script/", "https://example.com/script.js", false }, |
| + { "script-src https://example.com/script/", "https://example.com/script/script.js", true }, |
| + { "script-src https://example.com", "https://not.example.com/script.js", false }, |
| + { "script-src https://*.example.com", "https://not.example.com/script.js", true }, |
| + { "script-src https://*.example.com", "https://example.com/script.js", false }, |
| + |
| + // Falls back to default-src: |
| + { "default-src https://example.com", "https://example.com/script.js", true }, |
| + { "default-src https://example.com/", "https://example.com/script.js", true }, |
| + { "default-src https://example.com/", "https://example.com/script/script.js", true }, |
| + { "default-src https://example.com/script", "https://example.com/script.js", false }, |
| + { "default-src https://example.com/script", "https://example.com/script/script.js", false }, |
| + { "default-src https://example.com/script/", "https://example.com/script.js", false }, |
| + { "default-src https://example.com/script/", "https://example.com/script/script.js", true }, |
| + { "default-src https://example.com", "https://not.example.com/script.js", false }, |
| + { "default-src https://*.example.com", "https://not.example.com/script.js", true }, |
| + { "default-src https://*.example.com", "https://example.com/script.js", false }, |
| + }; |
| + |
| + for (const auto& test : cases) { |
| + SCOPED_TRACE(testing::Message() << "List: `" << test.list << "`, URL: `" << test.url << "`"); |
|
estark
2016/06/02 18:57:31
Did you intend to leave this in or was it just for
jww
2016/06/02 23:45:29
tl;dr I'm pretty sure this is on purpose. I believ
estark
2016/06/02 23:49:34
Oh! Cool! TIL. Thanks.
Mike West
2016/06/04 06:30:56
Yeah, if you're combining a bunch of test cases in
|
| + KURL scriptSrc = KURL(KURL(), test.url); |
| + |
| + // Report-only |
| + Member<CSPDirectiveList> policy = createList(test.list, ContentSecurityPolicyHeaderTypeReport); |
| + EXPECT_EQ(test.expected, policy->allowScriptFromSource(scriptSrc, String(), ResourceRequest::RedirectStatus::NoRedirect, ContentSecurityPolicy::SuppressReport)); |
| + |
| + // Enforce |
| + policy = createList(test.list, ContentSecurityPolicyHeaderTypeEnforce); |
| + EXPECT_EQ(test.expected, policy->allowScriptFromSource(scriptSrc, String(), ResourceRequest::RedirectStatus::NoRedirect, ContentSecurityPolicy::SuppressReport)); |
| + } |
| +} |
| + |
| +TEST_F(CSPDirectiveListTest, AllowScriptFromSourceWithNonce) |
| +{ |
| + struct TestCase { |
| + const char* list; |
| + const char* url; |
| + const char* nonce; |
| + bool expected; |
| + } cases[] = { |
| + // Doesn't effect lists without nonces: |
|
estark
2016/06/02 18:57:31
the nittiest of nits (here and below): affect
Mike West
2016/06/04 06:30:56
These words are my nemeses. :/
|
| + { "script-src https://example.com", "https://example.com/script.js", "yay", true }, |
| + { "script-src https://example.com", "https://example.com/script.js", "boo", true }, |
| + { "script-src https://example.com", "https://not.example.com/script.js", "yay", false }, |
| + { "script-src https://example.com", "https://not.example.com/script.js", "boo", false }, |
|
estark
2016/06/02 18:57:31
same suggestion about/empty null strings here perh
Mike West
2016/06/04 06:30:56
Done.
|
| + |
| + // Doesn't effect URLs that match the whitelist. |
| + { "script-src https://example.com 'nonce-yay'", "https://example.com/script.js", "yay", true }, |
| + { "script-src https://example.com 'nonce-yay'", "https://example.com/script.js", "boo", true }, |
| + |
| + // Does effect URLs that don't. |
| + { "script-src https://example.com 'nonce-yay'", "https://not.example.com/script.js", "yay", true }, |
| + { "script-src https://example.com 'nonce-yay'", "https://not.example.com/script.js", "boo", false }, |
| + }; |
| + |
| + for (const auto& test : cases) { |
| + SCOPED_TRACE(testing::Message() << "List: `" << test.list << "`, URL: `" << test.url << "`"); |
|
estark
2016/06/02 18:57:31
ditto, did you mean to leave this in?
|
| + KURL scriptSrc = KURL(KURL(), test.url); |
| + |
| + // Report-only |
| + Member<CSPDirectiveList> policy = createList(test.list, ContentSecurityPolicyHeaderTypeReport); |
| + EXPECT_EQ(test.expected, policy->allowScriptFromSource(scriptSrc, String(test.nonce), ResourceRequest::RedirectStatus::NoRedirect, ContentSecurityPolicy::SuppressReport)); |
| + |
| + // Enforce |
| + policy = createList(test.list, ContentSecurityPolicyHeaderTypeEnforce); |
| + EXPECT_EQ(test.expected, policy->allowScriptFromSource(scriptSrc, String(test.nonce), ResourceRequest::RedirectStatus::NoRedirect, ContentSecurityPolicy::SuppressReport)); |
| + } |
| +} |
| + |
|
estark
2016/06/02 18:57:31
Is there a reason you mostly test scripts in this
Mike West
2016/06/04 06:30:56
I've added style tests, thanks!
|
| +} // namespace blink |