| OLD | NEW |
| 1 <!DOCTYPE html> | 1 <!DOCTYPE html> |
| 2 <html> | 2 <html> |
| 3 <head> | 3 <head> |
| 4 <title>Embedded Enforcement: Embedding-CSP header.</title> | 4 <title>Embedded Enforcement: Embedding-CSP header.</title> |
| 5 <script src="/resources/testharness.js"></script> | 5 <script src="/resources/testharness.js"></script> |
| 6 <script src="/resources/testharnessreport.js"></script> | 6 <script src="/resources/testharnessreport.js"></script> |
| 7 <script src="support/testharness-helper.sub.js"></script> | 7 <script src="support/testharness-helper.sub.js"></script> |
| 8 </head> | 8 </head> |
| 9 <body> | 9 <body> |
| 10 <script> | 10 <script> |
| 11 var tests = [ | 11 var tests = [ |
| 12 { "name": "Embedding-CSP is not sent if `csp` attribute is not set on <ifr
ame>.", | 12 { "name": "Embedding-CSP is not sent if `csp` attribute is not set on <ifr
ame>.", |
| 13 "csp": null, | 13 "csp": null, |
| 14 "expected": null }, | 14 "expected": null }, |
| 15 { "name": "Send Embedding-CSP when `csp` attribute of <iframe> is not empt
y.", | 15 { "name": "Send Embedding-CSP when `csp` attribute of <iframe> is not empt
y.", |
| 16 "csp": "script-src 'unsafe-inline'", | 16 "csp": "script-src 'unsafe-inline'", |
| 17 "expected": "script-src 'unsafe-inline'" }, | 17 "expected": "script-src 'unsafe-inline'" }, |
| 18 { "name": "Send Embedding-CSP Header on change of `src` attribute on ifram
e.", | 18 { "name": "Send Embedding-CSP Header on change of `src` attribute on ifram
e.", |
| 19 "csp": "script-src 'unsafe-inline'", | 19 "csp": "script-src 'unsafe-inline'", |
| 20 "expected": "script-src 'unsafe-inline'" }, | 20 "expected": "script-src 'unsafe-inline'" }, |
| 21 { "name": "Wrong value of `csp` should not trigger sending Embedding-CSP H
eader.", | |
| 22 "csp": "completely wrong csp", | |
| 23 "expected": null}, | |
| 24 ]; | 21 ]; |
| 25 | 22 |
| 26 tests.forEach(test => { | 23 tests.forEach(test => { |
| 27 async_test(t => { | 24 async_test(t => { |
| 28 var url = generateURLString(Host.SAME_ORIGIN, PolicyHeader.EMBEDDING_CSP
); | 25 var url = generateURLString(Host.SAME_ORIGIN, PolicyHeader.EMBEDDING_CSP
); |
| 29 assert_embedding_csp(t, url, test.csp, test.expected); | 26 assert_embedding_csp(t, url, test.csp, test.expected); |
| 30 }, "Test same origin: " + test.name); | 27 }, "Test same origin: " + test.name); |
| 31 | 28 |
| 32 async_test(t => { | 29 async_test(t => { |
| 33 var url = generateURLString(Host.SAME_ORIGIN, PolicyHeader.EMBEDDING_CSP
); | 30 var url = generateURLString(Host.SAME_ORIGIN, PolicyHeader.EMBEDDING_CSP
); |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 69 t.done(); | 66 t.done(); |
| 70 } | 67 } |
| 71 })); | 68 })); |
| 72 | 69 |
| 73 document.body.appendChild(i); | 70 document.body.appendChild(i); |
| 74 }, "Test Embedding-CSP value on `csp` change: " + test.name); | 71 }, "Test Embedding-CSP value on `csp` change: " + test.name); |
| 75 }); | 72 }); |
| 76 </script> | 73 </script> |
| 77 </body> | 74 </body> |
| 78 </html> | 75 </html> |
| OLD | NEW |