Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(483)

Unified Diff: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp

Issue 2401573003: CSP: Fix 'strict-dynamic' with multiple policies. (Closed)
Patch Set: Tests compile. Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
index da501589fa34525661ee8101606286f0e2db22a8..c9dd09510cad457de3a815e15e8a6cca340ea468 100644
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
@@ -127,9 +127,10 @@ TEST_F(ContentSecurityPolicyTest, CopyStateFrom) {
ContentSecurityPolicy* csp2 = ContentSecurityPolicy::create();
csp2->copyStateFrom(csp.get());
- EXPECT_FALSE(csp2->allowScriptFromSource(
- exampleUrl, String(), ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_FALSE(
+ csp2->allowScriptFromSource(exampleUrl, String(), ParserInserted,
+ ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(csp2->allowPluginType("application/x-type-1",
"application/x-type-1", exampleUrl,
ContentSecurityPolicy::SuppressReport));
@@ -157,9 +158,10 @@ TEST_F(ContentSecurityPolicyTest, CopyPluginTypesFrom) {
ContentSecurityPolicy* csp2 = ContentSecurityPolicy::create();
csp2->copyPluginTypesFrom(csp.get());
- EXPECT_TRUE(csp2->allowScriptFromSource(
- exampleUrl, String(), ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_TRUE(
+ csp2->allowScriptFromSource(exampleUrl, String(), ParserInserted,
+ ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(csp2->allowPluginType("application/x-type-1",
"application/x-type-1", exampleUrl,
ContentSecurityPolicy::SuppressReport));
@@ -282,14 +284,16 @@ TEST_F(ContentSecurityPolicyTest, ObjectSrc) {
ContentSecurityPolicyHeaderSourceMeta);
EXPECT_FALSE(csp->allowRequest(WebURLRequest::RequestContextObject, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_FALSE(csp->allowRequest(WebURLRequest::RequestContextEmbed, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_FALSE(csp->allowRequest(
+ WebURLRequest::RequestContextEmbed, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(csp->allowRequest(WebURLRequest::RequestContextPlugin, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
}
@@ -306,32 +310,37 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInHeaderMissingIntegrity) {
ContentSecurityPolicyHeaderSourceHTTP);
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_FALSE(policy->allowRequest(
+ WebURLRequest::RequestContextStyle, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
url, String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
url, String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_TRUE(policy->allowRequest(
+ WebURLRequest::RequestContextImage, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
// Report
policy = ContentSecurityPolicy::create();
policy->bindToExecutionContext(document.get());
@@ -340,32 +349,37 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInHeaderMissingIntegrity) {
ContentSecurityPolicyHeaderSourceHTTP);
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_TRUE(policy->allowRequest(
+ WebURLRequest::RequestContextStyle, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
url, String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
url, String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_TRUE(policy->allowRequest(
+ WebURLRequest::RequestContextImage, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
}
// Tests that requests for scripts and styles are allowed
@@ -383,31 +397,33 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInHeaderPresentIntegrity) {
ContentSecurityPolicyHeaderTypeEnforce,
ContentSecurityPolicyHeaderSourceHTTP);
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
url, String(), integrityMetadata,
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
url, String(), integrityMetadata,
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
// Content-Security-Policy-Report-Only is not supported in meta element,
@@ -418,31 +434,33 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInHeaderPresentIntegrity) {
ContentSecurityPolicyHeaderTypeReport,
ContentSecurityPolicyHeaderSourceHTTP);
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
url, String(), integrityMetadata,
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
url, String(), integrityMetadata,
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
}
@@ -459,32 +477,37 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInMetaMissingIntegrity) {
ContentSecurityPolicyHeaderSourceMeta);
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_FALSE(policy->allowRequest(
+ WebURLRequest::RequestContextStyle, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
url, String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
url, String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_TRUE(policy->allowRequest(
+ WebURLRequest::RequestContextImage, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
// Content-Security-Policy-Report-Only is not supported in meta element,
// so nothing should be blocked
policy = ContentSecurityPolicy::create();
@@ -494,32 +517,37 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInMetaMissingIntegrity) {
ContentSecurityPolicyHeaderSourceMeta);
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_TRUE(policy->allowRequest(
+ WebURLRequest::RequestContextStyle, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
url, String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
url, String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
String(), IntegrityMetadataSet(),
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
- EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
- String(), IntegrityMetadataSet(),
- ResourceRequest::RedirectStatus::NoRedirect,
- ContentSecurityPolicy::SuppressReport));
+ EXPECT_TRUE(policy->allowRequest(
+ WebURLRequest::RequestContextImage, url, String(), IntegrityMetadataSet(),
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
+ ContentSecurityPolicy::SuppressReport));
}
// Tests that requests for scripts and styles are allowed
@@ -537,31 +565,33 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInMetaPresentIntegrity) {
ContentSecurityPolicyHeaderTypeEnforce,
ContentSecurityPolicyHeaderSourceMeta);
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
url, String(), integrityMetadata,
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
url, String(), integrityMetadata,
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
// Content-Security-Policy-Report-Only is not supported in meta element,
@@ -572,31 +602,33 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInMetaPresentIntegrity) {
ContentSecurityPolicyHeaderTypeReport,
ContentSecurityPolicyHeaderSourceMeta);
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
url, String(), integrityMetadata,
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
url, String(), integrityMetadata,
+ ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
- String(), integrityMetadata,
+ String(), integrityMetadata, ParserInserted,
ResourceRequest::RedirectStatus::NoRedirect,
ContentSecurityPolicy::SuppressReport));
}
@@ -632,8 +664,8 @@ TEST_F(ContentSecurityPolicyTest, NonceSinglePolicy) {
policy->didReceiveHeader(test.policy,
ContentSecurityPolicyHeaderTypeEnforce,
ContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_EQ(test.allowed,
- policy->allowScriptFromSource(resource, String(test.nonce)));
+ EXPECT_EQ(test.allowed, policy->allowScriptFromSource(
+ resource, String(test.nonce), ParserInserted));
// If this is expected to generate a violation, we should have sent a
// report.
EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
@@ -643,7 +675,8 @@ TEST_F(ContentSecurityPolicyTest, NonceSinglePolicy) {
policy->bindToExecutionContext(document.get());
policy->didReceiveHeader(test.policy, ContentSecurityPolicyHeaderTypeReport,
ContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce)));
+ EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce),
+ ParserInserted));
// If this is expected to generate a violation, we should have sent a
// report, even though we don't deny access in `allowScriptFromSource`:
EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
@@ -681,7 +714,7 @@ TEST_F(ContentSecurityPolicyTest, NonceInline) {
ContentSecurityPolicyHeaderSourceHTTP);
EXPECT_EQ(test.allowed,
policy->allowInlineScript(contextURL, String(test.nonce),
- contextLine, content));
+ ParserInserted, contextLine, content));
EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
// Enforce 'style-src'
@@ -701,8 +734,8 @@ TEST_F(ContentSecurityPolicyTest, NonceInline) {
policy->didReceiveHeader(String("script-src ") + test.policy,
ContentSecurityPolicyHeaderTypeReport,
ContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_TRUE(policy->allowInlineScript(contextURL, String(test.nonce),
- contextLine, content));
+ EXPECT_TRUE(policy->allowInlineScript(
+ contextURL, String(test.nonce), ParserInserted, contextLine, content));
EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
// Report 'style-src'
@@ -783,8 +816,8 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
policy->didReceiveHeader(test.policy2,
ContentSecurityPolicyHeaderTypeReport,
ContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_EQ(test.allowed1,
- policy->allowScriptFromSource(resource, String(test.nonce)));
+ EXPECT_EQ(test.allowed1, policy->allowScriptFromSource(
+ resource, String(test.nonce), ParserInserted));
EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
// Report / Enforce
@@ -796,8 +829,8 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
policy->didReceiveHeader(test.policy2,
ContentSecurityPolicyHeaderTypeEnforce,
ContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_EQ(test.allowed2,
- policy->allowScriptFromSource(resource, String(test.nonce)));
+ EXPECT_EQ(test.allowed2, policy->allowScriptFromSource(
+ resource, String(test.nonce), ParserInserted));
EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
// Enforce / Enforce
@@ -810,7 +843,8 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
ContentSecurityPolicyHeaderTypeEnforce,
ContentSecurityPolicyHeaderSourceHTTP);
EXPECT_EQ(test.allowed1 && test.allowed2,
- policy->allowScriptFromSource(resource, String(test.nonce)));
+ policy->allowScriptFromSource(resource, String(test.nonce),
+ ParserInserted));
EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
// Report / Report
@@ -822,7 +856,8 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
policy->didReceiveHeader(test.policy2,
ContentSecurityPolicyHeaderTypeReport,
ContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce)));
+ EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce),
+ ParserInserted));
EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
}
}

Powered by Google App Engine
This is Rietveld 408576698