Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1749)

Side by Side Diff: third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/resources/echo-intertag.pl

Issue 2428473004: Remove the 'reflected-xss' directive from CSP. (Closed)
Patch Set: Test. Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 #!/usr/bin/perl -wT 1 #!/usr/bin/perl -wT
2 use strict; 2 use strict;
3 use CGI; 3 use CGI;
4 4
5 my $cgi = new CGI; 5 my $cgi = new CGI;
6 6
7 # Passing semicolons through the url to this script is problematic. The raw 7 # Passing semicolons through the url to this script is problematic. The raw
8 # form truncates the input and the %-encoded form isn't being decoded. Hence 8 # form truncates the input and the %-encoded form isn't being decoded. Hence
9 # this set of hard-coded headers. 9 # this set of hard-coded headers.
10 if ($cgi->param('disable-protection')) { 10 if ($cgi->param('disable-protection')) {
(...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after
58 print "X-XSS-Protection: 1; red\n"; 58 print "X-XSS-Protection: 1; red\n";
59 } 59 }
60 if ($cgi->param('malformed-header') == 8) { 60 if ($cgi->param('malformed-header') == 8) {
61 print "X-XSS-Protection: 1; mode=block; report=/fail; mode=block;\n"; 61 print "X-XSS-Protection: 1; mode=block; report=/fail; mode=block;\n";
62 } 62 }
63 if ($cgi->param('malformed-header') == 9) { 63 if ($cgi->param('malformed-header') == 9) {
64 print "X-XSS-Protection: 1; mode=block; report=/fail; report=/fail;\n"; 64 print "X-XSS-Protection: 1; mode=block; report=/fail; report=/fail;\n";
65 } 65 }
66 } 66 }
67 67
68 if ($cgi->param('csp') eq '_empty_') {
69 print "Content-Security-Policy: reflected-xss\n";
70 } elsif ($cgi->param('csp')) {
71 print "Content-Security-Policy: reflected-xss " . $cgi->param('csp') . "\n";
72 }
73
74 print "Content-Type: text/html; charset="; 68 print "Content-Type: text/html; charset=";
75 print $cgi->param('charset') ? $cgi->param('charset') : "UTF-8"; 69 print $cgi->param('charset') ? $cgi->param('charset') : "UTF-8";
76 print "\n\n"; 70 print "\n\n";
77 71
78 print "<!DOCTYPE html>\n"; 72 print "<!DOCTYPE html>\n";
79 print "<html>\n"; 73 print "<html>\n";
80 if ($cgi->param('wait-for-load')) { 74 if ($cgi->param('wait-for-load')) {
81 print "<script>\n"; 75 print "<script>\n";
82 print "onload = function() {\n"; 76 print "onload = function() {\n";
83 print " window.parent.postMessage('loaded', '*');\n"; 77 print " window.parent.postMessage('loaded', '*');\n";
(...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after
147 if ($cgi->param('echo-report')) { 141 if ($cgi->param('echo-report')) {
148 print "<script src=/security/contentSecurityPolicy/resources/go-to-echo-repo rt.js></script>\n"; 142 print "<script src=/security/contentSecurityPolicy/resources/go-to-echo-repo rt.js></script>\n";
149 } 143 }
150 print "Page rendered here.\n"; 144 print "Page rendered here.\n";
151 if ($cgi->param('inHead')) { 145 if ($cgi->param('inHead')) {
152 print "</head>\n"; 146 print "</head>\n";
153 } else { 147 } else {
154 print "</body>\n"; 148 print "</body>\n";
155 } 149 }
156 print "</html>\n"; 150 print "</html>\n";
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698