content/base/test/csp/file_bug886164_5.html

Tue, 06 Jan 2015 21:39:09 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 06 Jan 2015 21:39:09 +0100
branch
TOR_BUG_9701
changeset 8
97036ab72558
permissions
-rw-r--r--

Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.

     1 <!DOCTYPE HTML>
     2 <html>
     3 <head> <meta charset="utf-8"> </head>
     4 <script type="text/javascript">
     5   function ok(result, desc) {
     6     window.parent.postMessage({ok: result, desc: desc}, "*");
     7   }
     9   function doStuff() {
    10     ok(true, "documents sandboxed with allow-scripts should be able to run inline scripts");
    11   }
    12 </script>
    13 <script src='file_iframe_sandbox_pass.js'></script>
    14 <body onLoad='ok(true, "documents sandboxed with allow-scripts should be able to run script from event listeners");doStuff();'>
    15   I am sandboxed but with only inline "allow-scripts"
    17  <!-- sandbox="allow-scripts" -->
    18  <!-- Content-Security-Policy: default-src 'none' 'unsafe-inline'-->
    20  <!-- these should be stopped by CSP -->
    21  <img src="/tests/content/base/test/csp/file_CSP.sjs?testid=img5_bad&type=img/png" />
    22  <img src="http://example.org/tests/content/base/test/csp/file_CSP.sjs?testid=img5a_bad&type=img/png"> </img>
    23  <script src='/tests/content/base/test/csp/file_CSP.sjs?testid=script5_bad&type=text/javascript'></script>
    24  <script src='http://example.org/tests/content/base/test/csp/file_CSP.sjs?testid=script5a_bad&type=text/javascript'></script>
    25 </body>
    26 </html>

mercurial