OLD | NEW |
(Empty) | |
| 1 <!DOCTYPE html> |
| 2 <html> |
| 3 <head> |
| 4 <title>Embedded Enforcement: Subsumption Algorithm - 'unsafe-hashed-attributes'
keyword.</title> |
| 5 <script src="/resources/testharness.js"></script> |
| 6 <script src="/resources/testharnessreport.js"></script> |
| 7 <script src="support/testharness-helper.sub.js"></script> |
| 8 </head> |
| 9 <body> |
| 10 <script> |
| 11 var tests = [ |
| 12 { "name": "'unsafe-hashed-attributes' is properly subsumed.", |
| 13 "required_csp": "style-src http://example1.com/foo/ 'self' 'unsafe-eval'
'strict-dynamic' 'unsafe-hashed-attributes'", |
| 14 "returned_csp_1": "style-src http://example1.com/foo/bar.html 'unsafe-ha
shed-attributes'", |
| 15 "expected": IframeLoad.EXPECT_LOAD }, |
| 16 { "name": "No other keyword has the same effect as 'unsafe-hashed-attribut
es'.", |
| 17 "required_csp": "style-src http://example1.com/foo/ 'self' 'unsafe-hashe
d-attributes'", |
| 18 "returned_csp_1": "style-src http://example1.com/foo/ 'unsafe-inline'", |
| 19 "expected": IframeLoad.EXPECT_BLOCK }, |
| 20 { "name": "Other expressions have to be subsumed.", |
| 21 "required_csp": "style-src http://example1.com/foo/ 'self' 'unsafe-hashe
d-attributes'", |
| 22 "returned_csp_1": "style-src http://example1.com/foo/ 'unsafe-inline' 'u
nsafe-hashed-attributes'", |
| 23 "expected": IframeLoad.EXPECT_BLOCK }, |
| 24 { "name": "Effective policy is properly found.", |
| 25 "required_csp": "style-src http://example1.com/foo/ 'self' 'unsafe-hash
ed-attributes'", |
| 26 "returned_csp_1": "style-src http://example1.com/foo/ 'unsafe-eval' 'uns
afe-hashed-attributes'", |
| 27 "returned_csp_2": "style-src http://example1.com/foo/ 'self' 'unsafe-has
hed-attributes'", |
| 28 "expected": IframeLoad.EXPECT_LOAD }, |
| 29 { "name": "Required csp must allow 'unsafe-hashed-attributes'.", |
| 30 "required_csp": "style-src http://example1.com/foo/ 'self'", |
| 31 "returned_csp_1": "style-src http://example1.com/foo/ 'self' 'unsafe-ha
shed-attributes'", |
| 32 "expected": IframeLoad.EXPECT_BLOCK }, |
| 33 { "name": "Effective policy is properly found where 'unsafe-hashed-attribu
tes' is not subsumed.", |
| 34 "required_csp": "style-src http://example1.com/foo/ 'self'", |
| 35 "returned_csp_1": "style-src 'unsafe-eval' 'unsafe-hashed-attributes'", |
| 36 "returned_csp_2": "style-src 'unsafe-hashed-attributes' 'unsafe-inline'"
, |
| 37 "expected": IframeLoad.EXPECT_BLOCK }, |
| 38 { "name": "Effective policy is properly found where 'unsafe-hashed-attribu
tes' is not part of it.", |
| 39 "required_csp": "style-src http://example1.com/foo/ 'self'", |
| 40 "returned_csp_1": "style-src 'unsafe-eval' 'self'", |
| 41 "returned_csp_2": "style-src 'unsafe-hashed-attributes' 'self'", |
| 42 "expected": IframeLoad.EXPECT_LOAD }, |
| 43 ]; |
| 44 tests.forEach(test => { |
| 45 async_test(t => { |
| 46 var url = generateUrlWithPolicies(Host.CROSS_ORIGIN, test.returned_csp_1
); |
| 47 if (test.returned_csp_2) |
| 48 url.searchParams.append("policy2", test.returned_csp_2); |
| 49 assert_iframe_with_csp(t, url, test.required_csp, test.expected, test.na
me, null); |
| 50 }, test.name); |
| 51 }); |
| 52 </script> |
| 53 </body> |
| 54 </html> |
OLD | NEW |