| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| index da501589fa34525661ee8101606286f0e2db22a8..c9dd09510cad457de3a815e15e8a6cca340ea468 100644
|
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| @@ -127,9 +127,10 @@ TEST_F(ContentSecurityPolicyTest, CopyStateFrom) {
|
|
|
| ContentSecurityPolicy* csp2 = ContentSecurityPolicy::create();
|
| csp2->copyStateFrom(csp.get());
|
| - EXPECT_FALSE(csp2->allowScriptFromSource(
|
| - exampleUrl, String(), ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_FALSE(
|
| + csp2->allowScriptFromSource(exampleUrl, String(), ParserInserted,
|
| + ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(csp2->allowPluginType("application/x-type-1",
|
| "application/x-type-1", exampleUrl,
|
| ContentSecurityPolicy::SuppressReport));
|
| @@ -157,9 +158,10 @@ TEST_F(ContentSecurityPolicyTest, CopyPluginTypesFrom) {
|
|
|
| ContentSecurityPolicy* csp2 = ContentSecurityPolicy::create();
|
| csp2->copyPluginTypesFrom(csp.get());
|
| - EXPECT_TRUE(csp2->allowScriptFromSource(
|
| - exampleUrl, String(), ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_TRUE(
|
| + csp2->allowScriptFromSource(exampleUrl, String(), ParserInserted,
|
| + ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(csp2->allowPluginType("application/x-type-1",
|
| "application/x-type-1", exampleUrl,
|
| ContentSecurityPolicy::SuppressReport));
|
| @@ -282,14 +284,16 @@ TEST_F(ContentSecurityPolicyTest, ObjectSrc) {
|
| ContentSecurityPolicyHeaderSourceMeta);
|
| EXPECT_FALSE(csp->allowRequest(WebURLRequest::RequestContextObject, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_FALSE(csp->allowRequest(WebURLRequest::RequestContextEmbed, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_FALSE(csp->allowRequest(
|
| + WebURLRequest::RequestContextEmbed, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(csp->allowRequest(WebURLRequest::RequestContextPlugin, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| }
|
| @@ -306,32 +310,37 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInHeaderMissingIntegrity) {
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_FALSE(policy->allowRequest(
|
| + WebURLRequest::RequestContextStyle, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
|
| url, String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
|
| url, String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_TRUE(policy->allowRequest(
|
| + WebURLRequest::RequestContextImage, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| // Report
|
| policy = ContentSecurityPolicy::create();
|
| policy->bindToExecutionContext(document.get());
|
| @@ -340,32 +349,37 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInHeaderMissingIntegrity) {
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_TRUE(policy->allowRequest(
|
| + WebURLRequest::RequestContextStyle, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
|
| url, String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
|
| url, String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_TRUE(policy->allowRequest(
|
| + WebURLRequest::RequestContextImage, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| }
|
|
|
| // Tests that requests for scripts and styles are allowed
|
| @@ -383,31 +397,33 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInHeaderPresentIntegrity) {
|
| ContentSecurityPolicyHeaderTypeEnforce,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
|
| url, String(), integrityMetadata,
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
|
| url, String(), integrityMetadata,
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| // Content-Security-Policy-Report-Only is not supported in meta element,
|
| @@ -418,31 +434,33 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInHeaderPresentIntegrity) {
|
| ContentSecurityPolicyHeaderTypeReport,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
|
| url, String(), integrityMetadata,
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
|
| url, String(), integrityMetadata,
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| }
|
| @@ -459,32 +477,37 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInMetaMissingIntegrity) {
|
| ContentSecurityPolicyHeaderSourceMeta);
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_FALSE(policy->allowRequest(
|
| + WebURLRequest::RequestContextStyle, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
|
| url, String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
|
| url, String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_FALSE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_TRUE(policy->allowRequest(
|
| + WebURLRequest::RequestContextImage, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| // Content-Security-Policy-Report-Only is not supported in meta element,
|
| // so nothing should be blocked
|
| policy = ContentSecurityPolicy::create();
|
| @@ -494,32 +517,37 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInMetaMissingIntegrity) {
|
| ContentSecurityPolicyHeaderSourceMeta);
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_TRUE(policy->allowRequest(
|
| + WebURLRequest::RequestContextStyle, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
|
| url, String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
|
| url, String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
|
| String(), IntegrityMetadataSet(),
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| - EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
|
| - String(), IntegrityMetadataSet(),
|
| - ResourceRequest::RedirectStatus::NoRedirect,
|
| - ContentSecurityPolicy::SuppressReport));
|
| + EXPECT_TRUE(policy->allowRequest(
|
| + WebURLRequest::RequestContextImage, url, String(), IntegrityMetadataSet(),
|
| + ParserInserted, ResourceRequest::RedirectStatus::NoRedirect,
|
| + ContentSecurityPolicy::SuppressReport));
|
| }
|
|
|
| // Tests that requests for scripts and styles are allowed
|
| @@ -537,31 +565,33 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInMetaPresentIntegrity) {
|
| ContentSecurityPolicyHeaderTypeEnforce,
|
| ContentSecurityPolicyHeaderSourceMeta);
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
|
| url, String(), integrityMetadata,
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
|
| url, String(), integrityMetadata,
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| // Content-Security-Policy-Report-Only is not supported in meta element,
|
| @@ -572,31 +602,33 @@ TEST_F(ContentSecurityPolicyTest, RequireSRIForInMetaPresentIntegrity) {
|
| ContentSecurityPolicyHeaderTypeReport,
|
| ContentSecurityPolicyHeaderSourceMeta);
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextScript, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImport, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextStyle, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextServiceWorker,
|
| url, String(), integrityMetadata,
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextSharedWorker,
|
| url, String(), integrityMetadata,
|
| + ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextWorker, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| EXPECT_TRUE(policy->allowRequest(WebURLRequest::RequestContextImage, url,
|
| - String(), integrityMetadata,
|
| + String(), integrityMetadata, ParserInserted,
|
| ResourceRequest::RedirectStatus::NoRedirect,
|
| ContentSecurityPolicy::SuppressReport));
|
| }
|
| @@ -632,8 +664,8 @@ TEST_F(ContentSecurityPolicyTest, NonceSinglePolicy) {
|
| policy->didReceiveHeader(test.policy,
|
| ContentSecurityPolicyHeaderTypeEnforce,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| - EXPECT_EQ(test.allowed,
|
| - policy->allowScriptFromSource(resource, String(test.nonce)));
|
| + EXPECT_EQ(test.allowed, policy->allowScriptFromSource(
|
| + resource, String(test.nonce), ParserInserted));
|
| // If this is expected to generate a violation, we should have sent a
|
| // report.
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
| @@ -643,7 +675,8 @@ TEST_F(ContentSecurityPolicyTest, NonceSinglePolicy) {
|
| policy->bindToExecutionContext(document.get());
|
| policy->didReceiveHeader(test.policy, ContentSecurityPolicyHeaderTypeReport,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| - EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce)));
|
| + EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce),
|
| + ParserInserted));
|
| // If this is expected to generate a violation, we should have sent a
|
| // report, even though we don't deny access in `allowScriptFromSource`:
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
| @@ -681,7 +714,7 @@ TEST_F(ContentSecurityPolicyTest, NonceInline) {
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_EQ(test.allowed,
|
| policy->allowInlineScript(contextURL, String(test.nonce),
|
| - contextLine, content));
|
| + ParserInserted, contextLine, content));
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
|
|
| // Enforce 'style-src'
|
| @@ -701,8 +734,8 @@ TEST_F(ContentSecurityPolicyTest, NonceInline) {
|
| policy->didReceiveHeader(String("script-src ") + test.policy,
|
| ContentSecurityPolicyHeaderTypeReport,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| - EXPECT_TRUE(policy->allowInlineScript(contextURL, String(test.nonce),
|
| - contextLine, content));
|
| + EXPECT_TRUE(policy->allowInlineScript(
|
| + contextURL, String(test.nonce), ParserInserted, contextLine, content));
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
|
|
| // Report 'style-src'
|
| @@ -783,8 +816,8 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
|
| policy->didReceiveHeader(test.policy2,
|
| ContentSecurityPolicyHeaderTypeReport,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| - EXPECT_EQ(test.allowed1,
|
| - policy->allowScriptFromSource(resource, String(test.nonce)));
|
| + EXPECT_EQ(test.allowed1, policy->allowScriptFromSource(
|
| + resource, String(test.nonce), ParserInserted));
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
|
|
| // Report / Enforce
|
| @@ -796,8 +829,8 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
|
| policy->didReceiveHeader(test.policy2,
|
| ContentSecurityPolicyHeaderTypeEnforce,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| - EXPECT_EQ(test.allowed2,
|
| - policy->allowScriptFromSource(resource, String(test.nonce)));
|
| + EXPECT_EQ(test.allowed2, policy->allowScriptFromSource(
|
| + resource, String(test.nonce), ParserInserted));
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
|
|
| // Enforce / Enforce
|
| @@ -810,7 +843,8 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
|
| ContentSecurityPolicyHeaderTypeEnforce,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_EQ(test.allowed1 && test.allowed2,
|
| - policy->allowScriptFromSource(resource, String(test.nonce)));
|
| + policy->allowScriptFromSource(resource, String(test.nonce),
|
| + ParserInserted));
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
|
|
| // Report / Report
|
| @@ -822,7 +856,8 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
|
| policy->didReceiveHeader(test.policy2,
|
| ContentSecurityPolicyHeaderTypeReport,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| - EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce)));
|
| + EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce),
|
| + ParserInserted));
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
| }
|
| }
|
|
|