Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(500)

Unified Diff: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp

Issue 2790693002: Split CSP into pre- and post-upgrade checks (Closed)
Patch Set: revert accidental AbstractWorker change Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
index 93a558694bc73797072714aef55d32cea42dbded..d5839b4866fbab14ffd968e6cc2d5c4f884b7c99 100644
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
@@ -133,16 +133,19 @@ TEST_F(ContentSecurityPolicyTest, CopyStateFrom) {
EXPECT_FALSE(csp2->AllowScriptFromSource(
example_url, String(), IntegrityMetadataSet(), kParserInserted,
ResourceRequest::RedirectStatus::kNoRedirect,
- SecurityViolationReportingPolicy::kSuppressReporting));
+ SecurityViolationReportingPolicy::kSuppressReporting,
+ ContentSecurityPolicy::CheckHeaderType::kCheckReportOnly));
EXPECT_TRUE(csp2->AllowPluginType(
"application/x-type-1", "application/x-type-1", example_url,
SecurityViolationReportingPolicy::kSuppressReporting));
EXPECT_TRUE(csp2->AllowImageFromSource(
example_url, ResourceRequest::RedirectStatus::kNoRedirect,
- SecurityViolationReportingPolicy::kSuppressReporting));
+ SecurityViolationReportingPolicy::kSuppressReporting,
+ ContentSecurityPolicy::CheckHeaderType::kCheckReportOnly));
EXPECT_FALSE(csp2->AllowImageFromSource(
not_example_url, ResourceRequest::RedirectStatus::kNoRedirect,
- SecurityViolationReportingPolicy::kSuppressReporting));
+ SecurityViolationReportingPolicy::kSuppressReporting,
+ ContentSecurityPolicy::CheckHeaderType::kCheckReportOnly));
EXPECT_FALSE(csp2->AllowPluginType(
"application/x-type-2", "application/x-type-2", example_url,
SecurityViolationReportingPolicy::kSuppressReporting));
@@ -686,7 +689,10 @@ TEST_F(ContentSecurityPolicyTest, NonceSinglePolicy) {
kContentSecurityPolicyHeaderTypeReport,
kContentSecurityPolicyHeaderSourceHTTP);
EXPECT_TRUE(policy->AllowScriptFromSource(
- resource, String(test.nonce), IntegrityMetadataSet(), kParserInserted));
+ resource, String(test.nonce), IntegrityMetadataSet(), kParserInserted,
+ ResourceRequest::RedirectStatus::kNoRedirect,
+ SecurityViolationReportingPolicy::kReport,
+ ContentSecurityPolicy::CheckHeaderType::kCheckReportOnly));
// If this is expected to generate a violation, we should have sent a
// report, even though we don't deny access in `allowScriptFromSource`:
EXPECT_EQ(expected_reports, policy->violation_reports_sent_.size());
@@ -827,9 +833,17 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
policy->DidReceiveHeader(test.policy2,
kContentSecurityPolicyHeaderTypeReport,
kContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_EQ(test.allowed1, policy->AllowScriptFromSource(
- resource, String(test.nonce),
- IntegrityMetadataSet(), kParserInserted));
+ EXPECT_EQ(test.allowed1,
+ policy->AllowScriptFromSource(
+ resource, String(test.nonce), IntegrityMetadataSet(),
+ kParserInserted, ResourceRequest::RedirectStatus::kNoRedirect,
+ SecurityViolationReportingPolicy::kReport,
+ ContentSecurityPolicy::CheckHeaderType::kCheckEnforce));
+ EXPECT_TRUE(policy->AllowScriptFromSource(
+ resource, String(test.nonce), IntegrityMetadataSet(), kParserInserted,
+ ResourceRequest::RedirectStatus::kNoRedirect,
+ SecurityViolationReportingPolicy::kReport,
+ ContentSecurityPolicy::CheckHeaderType::kCheckReportOnly));
EXPECT_EQ(expected_reports, policy->violation_reports_sent_.size());
// Report / Enforce
@@ -841,9 +855,17 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
policy->DidReceiveHeader(test.policy2,
kContentSecurityPolicyHeaderTypeEnforce,
kContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_EQ(test.allowed2, policy->AllowScriptFromSource(
- resource, String(test.nonce),
- IntegrityMetadataSet(), kParserInserted));
+ EXPECT_TRUE(policy->AllowScriptFromSource(
+ resource, String(test.nonce), IntegrityMetadataSet(), kParserInserted,
+ ResourceRequest::RedirectStatus::kNoRedirect,
+ SecurityViolationReportingPolicy::kReport,
+ ContentSecurityPolicy::CheckHeaderType::kCheckReportOnly));
+ EXPECT_EQ(test.allowed2,
+ policy->AllowScriptFromSource(
+ resource, String(test.nonce), IntegrityMetadataSet(),
+ kParserInserted, ResourceRequest::RedirectStatus::kNoRedirect,
+ SecurityViolationReportingPolicy::kReport,
+ ContentSecurityPolicy::CheckHeaderType::kCheckEnforce));
EXPECT_EQ(expected_reports, policy->violation_reports_sent_.size());
// Enforce / Enforce
@@ -855,10 +877,12 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
policy->DidReceiveHeader(test.policy2,
kContentSecurityPolicyHeaderTypeEnforce,
kContentSecurityPolicyHeaderSourceHTTP);
- EXPECT_EQ(
- test.allowed1 && test.allowed2,
- policy->AllowScriptFromSource(resource, String(test.nonce),
- IntegrityMetadataSet(), kParserInserted));
+ EXPECT_EQ(test.allowed1 && test.allowed2,
+ policy->AllowScriptFromSource(
+ resource, String(test.nonce), IntegrityMetadataSet(),
+ kParserInserted, ResourceRequest::RedirectStatus::kNoRedirect,
+ SecurityViolationReportingPolicy::kReport,
+ ContentSecurityPolicy::CheckHeaderType::kCheckEnforce));
EXPECT_EQ(expected_reports, policy->violation_reports_sent_.size());
// Report / Report
@@ -871,7 +895,10 @@ TEST_F(ContentSecurityPolicyTest, NonceMultiplePolicy) {
kContentSecurityPolicyHeaderTypeReport,
kContentSecurityPolicyHeaderSourceHTTP);
EXPECT_TRUE(policy->AllowScriptFromSource(
- resource, String(test.nonce), IntegrityMetadataSet(), kParserInserted));
+ resource, String(test.nonce), IntegrityMetadataSet(), kParserInserted,
+ ResourceRequest::RedirectStatus::kNoRedirect,
+ SecurityViolationReportingPolicy::kReport,
+ ContentSecurityPolicy::CheckHeaderType::kCheckReportOnly));
EXPECT_EQ(expected_reports, policy->violation_reports_sent_.size());
}
}

Powered by Google App Engine
This is Rietveld 408576698