Index: extensions/common/csp_validator_unittest.cc |
diff --git a/extensions/common/csp_validator_unittest.cc b/extensions/common/csp_validator_unittest.cc |
index 1afa0b1a3f387f40d138e3df09215a6d7a2b9138..a9728f9d1be293ccf38895502fd296f5577d8c4b 100644 |
--- a/extensions/common/csp_validator_unittest.cc |
+++ b/extensions/common/csp_validator_unittest.cc |
@@ -3,16 +3,112 @@ |
// found in the LICENSE file. |
#include "extensions/common/csp_validator.h" |
+#include "extensions/common/error_utils.h" |
+#include "extensions/common/install_warning.h" |
+#include "extensions/common/manifest_constants.h" |
#include "testing/gtest/include/gtest/gtest.h" |
using extensions::csp_validator::ContentSecurityPolicyIsLegal; |
-using extensions::csp_validator::ContentSecurityPolicyIsSecure; |
+using extensions::csp_validator::SanitizeContentSecurityPolicy; |
using extensions::csp_validator::ContentSecurityPolicyIsSandboxed; |
using extensions::csp_validator::OPTIONS_NONE; |
using extensions::csp_validator::OPTIONS_ALLOW_UNSAFE_EVAL; |
using extensions::csp_validator::OPTIONS_ALLOW_INSECURE_OBJECT_SRC; |
+using extensions::ErrorUtils; |
+using extensions::InstallWarning; |
using extensions::Manifest; |
+namespace { |
+ |
+std::string InsecureValueWarning(const std::string& directive, |
+ const std::string& value) { |
+ return ErrorUtils::FormatErrorMessage( |
+ extensions::manifest_errors::kInvalidCSPInsecureValue, value, directive); |
+} |
+ |
+std::string MissingSecureSrcWarning(const std::string& directive) { |
+ return ErrorUtils::FormatErrorMessage( |
+ extensions::manifest_errors::kInvalidCSPMissingSecureSrc, directive); |
+} |
+ |
+testing::AssertionResult CheckSanitizeCSP( |
+ const std::string& policy, |
+ int options, |
+ const std::string& expected_csp, |
+ const std::vector<std::string>& expected_warnings) { |
+ std::vector<InstallWarning> actual_warnings; |
+ std::string actual_csp = SanitizeContentSecurityPolicy(policy, |
+ options, |
+ &actual_warnings); |
+ if (actual_csp != expected_csp) |
+ return testing::AssertionFailure() |
+ << "SanitizeContentSecurityPolicy returned an unexpected CSP.\n" |
+ << "Expected CSP: " << expected_csp << "\n" |
+ << " Actual CSP: " << actual_csp; |
+ |
+ if (expected_warnings.size() != actual_warnings.size()) { |
+ testing::Message msg; |
+ msg << "Expected " << expected_warnings.size() |
+ << " warnings, but got " << actual_warnings.size(); |
+ for (size_t i = 0; i < actual_warnings.size(); ++i) |
+ msg << "\nWarning " << i << " " << actual_warnings[i].message; |
+ return testing::AssertionFailure() << msg; |
+ } |
+ |
+ for (size_t i = 0; i < expected_warnings.size(); ++i) { |
+ if (expected_warnings[i] != actual_warnings[i].message) |
+ return testing::AssertionFailure() |
+ << "Unexpected warning from SanitizeContentSecurityPolicy.\n" |
+ << "Expected warning[" << i << "]: " << expected_warnings[i] |
+ << " Actual warning[" << i << "]: " << actual_warnings[i].message; |
+ } |
+ return testing::AssertionSuccess(); |
+} |
+ |
+testing::AssertionResult CheckSanitizeCSP(const std::string& policy, |
+ int options) { |
+ return CheckSanitizeCSP(policy, options, policy, std::vector<std::string>()); |
+} |
+ |
+testing::AssertionResult CheckSanitizeCSP(const std::string& policy, |
+ int options, |
+ const std::string& expected_csp) { |
+ std::vector<std::string> expected_warnings; |
+ return CheckSanitizeCSP(policy, options, expected_csp, expected_warnings); |
+} |
+ |
+testing::AssertionResult CheckSanitizeCSP(const std::string& policy, |
+ int options, |
+ const std::string& expected_csp, |
+ const std::string& warning1) { |
+ std::vector<std::string> expected_warnings(1, warning1); |
+ return CheckSanitizeCSP(policy, options, expected_csp, expected_warnings); |
+} |
+ |
+testing::AssertionResult CheckSanitizeCSP(const std::string& policy, |
+ int options, |
+ const std::string& expected_csp, |
+ const std::string& warning1, |
+ const std::string& warning2) { |
+ std::vector<std::string> expected_warnings(1, warning1); |
+ expected_warnings.push_back(warning2); |
+ return CheckSanitizeCSP(policy, options, expected_csp, expected_warnings); |
+} |
+ |
+testing::AssertionResult CheckSanitizeCSP(const std::string& policy, |
+ int options, |
+ const std::string& expected_csp, |
+ const std::string& warning1, |
+ const std::string& warning2, |
+ const std::string& warning3) { |
+ std::vector<std::string> expected_warnings(1, warning1); |
+ expected_warnings.push_back(warning2); |
+ expected_warnings.push_back(warning3); |
+ return CheckSanitizeCSP(policy, options, expected_csp, expected_warnings); |
+} |
+ |
+}; // namespace |
+ |
TEST(ExtensionCSPValidator, IsLegal) { |
EXPECT_TRUE(ContentSecurityPolicyIsLegal("foo")); |
EXPECT_TRUE(ContentSecurityPolicyIsLegal( |
@@ -26,188 +122,277 @@ TEST(ExtensionCSPValidator, IsLegal) { |
} |
TEST(ExtensionCSPValidator, IsSecure) { |
- EXPECT_FALSE( |
- ContentSecurityPolicyIsSecure(std::string(), OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure("img-src https://google.com", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
- |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src *", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self'", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'none'", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' ftp://google.com", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://google.com", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src *; default-src 'self'", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self'; default-src *", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self'; default-src *; script-src *; script-src 'self'", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self'; default-src *; script-src 'self'; script-src *", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ std::string(), OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "script-src 'self' chrome-extension-resource:; object-src 'self';", |
+ MissingSecureSrcWarning("script-src"), |
+ MissingSecureSrcWarning("object-src"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "img-src https://google.com", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "img-src https://google.com; script-src 'self'" |
+ " chrome-extension-resource:; object-src 'self';", |
+ MissingSecureSrcWarning("script-src"), |
+ MissingSecureSrcWarning("object-src"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src a b", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "script-src; object-src 'self';", |
+ InsecureValueWarning("script-src", "a"), |
+ InsecureValueWarning("script-src", "b"), |
+ MissingSecureSrcWarning("object-src"))); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src *; script-src 'self'", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src *", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src;", |
+ InsecureValueWarning("default-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self';", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'none';", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' ftp://google.com", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "ftp://google.com"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://google.com;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src *; default-src 'self'", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src; default-src 'self';", |
+ InsecureValueWarning("default-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self'; default-src *;", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self'; default-src;")); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self'; default-src *; script-src *; script-src 'self'", |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self'; default-src; script-src; script-src 'self';", |
+ InsecureValueWarning("script-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self'; default-src *; script-src 'self'; script-src *;", |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self'; default-src; script-src 'self'; script-src;")); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src *; script-src 'self'", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src; script-src 'self';", |
+ InsecureValueWarning("default-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
"default-src *; script-src 'self'; img-src 'self'", |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src; script-src 'self'; img-src 'self';", |
+ InsecureValueWarning("default-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src *; script-src 'self'; object-src 'self';", |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src; script-src 'self'; object-src 'self';")); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src 'self'; object-src 'self';", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'unsafe-eval';", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'unsafe-eval'", OPTIONS_NONE, |
+ "default-src;", |
+ InsecureValueWarning("default-src", "'unsafe-eval'"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'unsafe-inline'", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src;", |
+ InsecureValueWarning("default-src", "'unsafe-inline'"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'unsafe-inline' 'none'", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'none';", |
+ InsecureValueWarning("default-src", "'unsafe-inline'"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' http://google.com", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "http://google.com"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://google.com;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' chrome://resources;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' chrome-extension://aabbcc;", |
OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src *; script-src 'self'; object-src 'self'", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "script-src 'self'; object-src 'self'", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'unsafe-eval'", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'unsafe-eval'", OPTIONS_NONE)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'unsafe-inline'", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'unsafe-inline' 'none'", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' http://google.com", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://google.com", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' chrome://resources", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' chrome-extension://aabbcc", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' chrome-extension-resource://aabbcc", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https:", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' http:", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' google.com", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' *", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' *:*", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' *:*/", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' *:*/path", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- // "https://" is an invalid CSP, so it will be ignored by Blink. |
- // TODO(robwu): Change to EXPECT_FALSE once http://crbug.com/434773 is fixed. |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*:*", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*:*/", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*:*/path", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.com", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.*.google.com/", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.*.google.com:*/", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://www.*.google.com/", |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' chrome-extension-resource://aabbcc;", |
OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https:", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https:"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' http:", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "http:"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' google.com", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "google.com"))); |
+ |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' *", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' *:*", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "*:*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' *:*/", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "*:*/"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' *:*/path", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "*:*/path"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*:*", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://*:*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*:*/", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://*:*/"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*:*/path", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://*:*/path"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.com", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://*.com"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.*.google.com/", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://*.*.google.com/"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.*.google.com:*/", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://*.*.google.com:*/"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://www.*.google.com/", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://www.*.google.com/"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
"default-src 'self' https://www.*.google.com:*/", |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "https://www.*.google.com:*/"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' chrome://*", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "chrome://*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' chrome-extension://*", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "chrome-extension://*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' chrome-extension://", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "chrome-extension://"))); |
+ |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.google.com;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.google.com:1;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.google.com:*;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.google.com:1/;", |
OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' chrome://*", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' chrome-extension://*", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.google.com", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.google.com:1", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.google.com:*", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.google.com:1/", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.google.com:*/", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' http://127.0.0.1", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' http://localhost", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' http://lOcAlHoSt", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' http://127.0.0.1:9999", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' http://localhost:8888", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' http://127.0.0.1.example.com", |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.google.com:*/;", |
OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
+ |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' http://127.0.0.1;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' http://localhost;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' http://lOcAlHoSt;", OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self' http://localhost;")); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' http://127.0.0.1:9999;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' http://localhost:8888;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' http://127.0.0.1.example.com", |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "http://127.0.0.1.example.com"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
"default-src 'self' http://localhost.example.com", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "http://localhost.example.com"))); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' blob:", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' blob:;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
"default-src 'self' blob:http://example.com/XXX", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' filesystem:", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' filesystem:http://example.com/XXX", |
- OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "blob:http://example.com/xxx"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' filesystem:;", OPTIONS_ALLOW_UNSAFE_EVAL)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' filesystem:http://example.com/XX", |
+ OPTIONS_ALLOW_UNSAFE_EVAL, |
+ "default-src 'self';", |
+ InsecureValueWarning("default-src", "filesystem:http://example.com/xx"))); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://*.googleapis.com", |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://*.googleapis.com;", |
OPTIONS_ALLOW_UNSAFE_EVAL)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' https://x.googleapis.com", |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "default-src 'self' https://x.googleapis.com;", |
OPTIONS_ALLOW_UNSAFE_EVAL)); |
- // "chrome-extension://" is an invalid CSP and ignored by Blink, but extension |
- // authors have been using this string anyway, so we cannot refuse this string |
- // until extensions can be loaded with an invalid CSP. http://crbug.com/434773 |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "default-src 'self' chrome-extension://", OPTIONS_ALLOW_UNSAFE_EVAL)); |
- |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "script-src 'self'; object-src *", OPTIONS_NONE)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "script-src 'self'; object-src *", OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "script-src 'self'; object-src *; plugin-types application/pdf", |
- OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "script-src 'self'; object-src *; " |
- "plugin-types application/x-shockwave-flash", |
- OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "script-src 'self'; object-src *; " |
- "plugin-types application/x-shockwave-flash application/pdf", |
- OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "script-src 'self'; object-src http://www.example.com; " |
- "plugin-types application/pdf", |
- OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "object-src http://www.example.com blob:; script-src 'self'; " |
- "plugin-types application/pdf", |
- OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
- EXPECT_TRUE(ContentSecurityPolicyIsSecure( |
- "script-src 'self'; object-src http://*.example.com; " |
- "plugin-types application/pdf", |
- OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "script-src *; object-src *; plugin-types application/pdf", |
- OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
+ |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src 'self'; object-src *", OPTIONS_NONE, |
+ "script-src 'self'; object-src;", |
+ InsecureValueWarning("object-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src 'self'; object-src *", OPTIONS_ALLOW_INSECURE_OBJECT_SRC, |
+ "script-src 'self'; object-src;", |
+ InsecureValueWarning("object-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src 'self'; object-src *; plugin-types application/pdf;", |
+ OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src 'self'; object-src *; " |
+ "plugin-types application/x-shockwave-flash", |
+ OPTIONS_ALLOW_INSECURE_OBJECT_SRC, |
+ "script-src 'self'; object-src; " |
+ "plugin-types application/x-shockwave-flash;", |
+ InsecureValueWarning("object-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src 'self'; object-src *; " |
+ "plugin-types application/x-shockwave-flash application/pdf;", |
+ OPTIONS_ALLOW_INSECURE_OBJECT_SRC, |
+ "script-src 'self'; object-src; " |
+ "plugin-types application/x-shockwave-flash application/pdf;", |
+ InsecureValueWarning("object-src", "*"))); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src 'self'; object-src http://www.example.com; " |
+ "plugin-types application/pdf;", |
+ OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "object-src http://www.example.com blob:; script-src 'self'; " |
+ "plugin-types application/pdf;", |
+ OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src 'self'; object-src http://*.example.com; " |
+ "plugin-types application/pdf;", |
+ OPTIONS_ALLOW_INSECURE_OBJECT_SRC)); |
+ EXPECT_TRUE(CheckSanitizeCSP( |
+ "script-src *; object-src *; plugin-types application/pdf;", |
+ OPTIONS_ALLOW_INSECURE_OBJECT_SRC, |
+ "script-src; object-src *; plugin-types application/pdf;", |
+ InsecureValueWarning("script-src", "*"))); |
} |
TEST(ExtensionCSPValidator, IsSandboxed) { |