103 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			TypeScript
		
	
	
	
		
		
			
		
	
	
			103 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			TypeScript
		
	
	
	
|  | /** | ||
|  |  * Copyright 2018 Google Inc. All rights reserved. | ||
|  |  * Modifications copyright (c) Microsoft Corporation. | ||
|  |  * | ||
|  |  * Licensed under the Apache License, Version 2.0 (the "License"); | ||
|  |  * you may not use this file except in compliance with the License. | ||
|  |  * You may obtain a copy of the License at | ||
|  |  * | ||
|  |  *     http://www.apache.org/licenses/LICENSE-2.0
 | ||
|  |  * | ||
|  |  * Unless required by applicable law or agreed to in writing, software | ||
|  |  * distributed under the License is distributed on an "AS IS" BASIS, | ||
|  |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
|  |  * See the License for the specific language governing permissions and | ||
|  |  * limitations under the License. | ||
|  |  */ | ||
|  | 
 | ||
|  | import { browserTest as it, expect } from '../config/browserTest'; | ||
|  | import { attachFrame } from '../config/utils'; | ||
|  | 
 | ||
|  | it('should bypass CSP meta tag @smoke', async ({ browser, server }) => { | ||
|  |   // Make sure CSP prohibits addScriptTag.
 | ||
|  |   { | ||
|  |     const context = await browser.newContext(); | ||
|  |     const page = await context.newPage(); | ||
|  |     await page.goto(server.PREFIX + '/csp.html'); | ||
|  |     await page.addScriptTag({ content: 'window["__injected"] = 42;' }).catch(e => void e); | ||
|  |     expect(await page.evaluate('window["__injected"]')).toBe(undefined); | ||
|  |     await context.close(); | ||
|  |   } | ||
|  | 
 | ||
|  |   // By-pass CSP and try one more time.
 | ||
|  |   { | ||
|  |     const context = await browser.newContext({ bypassCSP: true }); | ||
|  |     const page = await context.newPage(); | ||
|  |     await page.goto(server.PREFIX + '/csp.html'); | ||
|  |     await page.addScriptTag({ content: 'window["__injected"] = 42;' }); | ||
|  |     expect(await page.evaluate('window["__injected"]')).toBe(42); | ||
|  |     await context.close(); | ||
|  |   } | ||
|  | }); | ||
|  | 
 | ||
|  | it('should bypass CSP header', async ({ browser, server }) => { | ||
|  |   // Make sure CSP prohibits addScriptTag.
 | ||
|  |   server.setCSP('/empty.html', 'default-src "self"'); | ||
|  | 
 | ||
|  |   { | ||
|  |     const context = await browser.newContext(); | ||
|  |     const page = await context.newPage(); | ||
|  |     await page.goto(server.EMPTY_PAGE); | ||
|  |     await page.addScriptTag({ content: 'window["__injected"] = 42;' }).catch(e => void e); | ||
|  |     expect(await page.evaluate('window["__injected"]')).toBe(undefined); | ||
|  |     await context.close(); | ||
|  |   } | ||
|  | 
 | ||
|  |   // By-pass CSP and try one more time.
 | ||
|  |   { | ||
|  |     const context = await browser.newContext({ bypassCSP: true }); | ||
|  |     const page = await context.newPage(); | ||
|  |     await page.goto(server.EMPTY_PAGE); | ||
|  |     await page.addScriptTag({ content: 'window["__injected"] = 42;' }); | ||
|  |     expect(await page.evaluate('window["__injected"]')).toBe(42); | ||
|  |     await context.close(); | ||
|  |   } | ||
|  | }); | ||
|  | 
 | ||
|  | it('should bypass after cross-process navigation', async ({ browser, server }) => { | ||
|  |   const context = await browser.newContext({ bypassCSP: true }); | ||
|  |   const page = await context.newPage(); | ||
|  |   await page.goto(server.PREFIX + '/csp.html'); | ||
|  |   await page.addScriptTag({ content: 'window["__injected"] = 42;' }); | ||
|  |   expect(await page.evaluate('window["__injected"]')).toBe(42); | ||
|  | 
 | ||
|  |   await page.goto(server.CROSS_PROCESS_PREFIX + '/csp.html'); | ||
|  |   await page.addScriptTag({ content: 'window["__injected"] = 42;' }); | ||
|  |   expect(await page.evaluate('window["__injected"]')).toBe(42); | ||
|  |   await context.close(); | ||
|  | }); | ||
|  | 
 | ||
|  | it('should bypass CSP in iframes as well', async ({ browser, server }) => { | ||
|  |   // Make sure CSP prohibits addScriptTag in an iframe.
 | ||
|  |   { | ||
|  |     const context = await browser.newContext(); | ||
|  |     const page = await context.newPage(); | ||
|  |     await page.goto(server.EMPTY_PAGE); | ||
|  |     const frame = await attachFrame(page, 'frame1', server.PREFIX + '/csp.html'); | ||
|  |     await frame.addScriptTag({ content: 'window["__injected"] = 42;' }).catch(e => void e); | ||
|  |     expect(await frame.evaluate('window["__injected"]')).toBe(undefined); | ||
|  |     await context.close(); | ||
|  |   } | ||
|  | 
 | ||
|  |   // By-pass CSP and try one more time.
 | ||
|  |   { | ||
|  |     const context = await browser.newContext({ bypassCSP: true }); | ||
|  |     const page = await context.newPage(); | ||
|  |     await page.goto(server.EMPTY_PAGE); | ||
|  |     const frame = await attachFrame(page, 'frame1', server.PREFIX + '/csp.html'); | ||
|  |     await frame.addScriptTag({ content: 'window["__injected"] = 42;' }).catch(e => void e); | ||
|  |     expect(await frame.evaluate('window["__injected"]')).toBe(42); | ||
|  |     await context.close(); | ||
|  |   } | ||
|  | }); |