test_use_with_hsts.html 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. <!DOCTYPE HTML>
  2. <html>
  3. <!--
  4. https://bugzilla.mozilla.org/show_bug.cgi?id=1247733
  5. -->
  6. <head>
  7. <meta charset="utf-8">
  8. <title>Test for Bug 1247733</title>
  9. <script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
  10. <script type="application/javascript" src="/tests/SimpleTest/WindowSnapshot.js"></script>
  11. <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
  12. </head>
  13. <body>
  14. <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1247733">Mozilla Bug 1247733</a>
  15. <p id="display">
  16. <iframe id="myIframe"></iframe>
  17. </p>
  18. <div id="content" style="display: none">
  19. </div>
  20. <pre id="test"></pre>
  21. <script type="application/javascript">
  22. /** Test for Bug 1247733 **/
  23. /**
  24. * This test ensures that we render the SVG 'use' element correctly, in
  25. * pages that have been upgraded from HTTP to HTTPS using strict transport
  26. * security (HSTS)
  27. *
  28. * Specifically:
  29. * (1) We load a file using HTTPS, in an iframe. The file gets sent
  30. * with a Strict-Transport-Security flag.
  31. * (2) We load the same file again, but now over HTTP (which should get
  32. * upgraded to HTTPS, since we received the Strict-Transport-Security
  33. * flag during the first load).
  34. * (3) After each of the above loads, we take a snapshot of the iframe
  35. * and ensure that it renders as fully lime (which the 'use' element
  36. * is responsible for). If the 'use' element fails to render, the iframe
  37. * will be fully red, and we'll fail an "assertSnapshots" check.
  38. */
  39. SimpleTest.waitForExplicitFinish();
  40. const iframe = document.getElementById("myIframe");
  41. const iframeWin = iframe.contentWindow;
  42. // URI for our testcase with 'use' element, via HTTP and HTTPS:
  43. const insecureURI = "http://example.com/tests/dom/svg/test/use-with-hsts-helper.html";
  44. const secureURI = "https://example.com/tests/dom/svg/test/use-with-hsts-helper.html";
  45. // Snapshots that we'll populate below:
  46. var blankSnapshot; // Snapshot of blank iframe.
  47. var refSnapshot; // Snapshot of lime reference rendering in iframe.
  48. var secureSnapshot; // Snapshot of testcase using HTTPS.
  49. var upgradedSnapshot; // Snapshot of testcase using HTTP-upgraded-to-HTTPS.
  50. // Bookkeeping to be sure receiveMessage is called as many times as we expect:
  51. var numPostMessageCalls = 0;
  52. const expectedNumPostMessageCalls = 2; // (We load the helper file twice.)
  53. // Helper function, called via postMessage, to check iframe's actual location:
  54. function receiveMessage(event) {
  55. is(event.data, secureURI, "iframe should end up viewing secure URI");
  56. numPostMessageCalls++;
  57. }
  58. // TEST CODE BEGINS HERE.
  59. // Execution basically proceeds top-to-bottom through the functions
  60. // from this point on, via a chain of iframe onload-callbacks.
  61. function runTest() {
  62. // Capture a snapshot with nothing in the iframe, so we can do a
  63. // sanity-check not-equal comparison against our reference case, to be
  64. // sure we're rendering anything at all:
  65. blankSnapshot = snapshotWindow(iframeWin);
  66. // Point iframe at a reference case:
  67. iframe.onload = captureRefSnapshot;
  68. iframe.src = "data:text/html,<body style='background:lime'>";
  69. }
  70. function captureRefSnapshot() {
  71. // Capture the reference screenshot:
  72. refSnapshot = snapshotWindow(iframeWin);
  73. // Ensure reference-case looks different from blank snapshot:
  74. assertSnapshots(refSnapshot, blankSnapshot,
  75. false /*not equal*/, null /*no fuzz*/,
  76. "refSnapshot", "blankSnapshot");
  77. // OK, assuming we've got a valid refSnapshot, we can now proceed to
  78. // capture test screenshots.
  79. // Register a postMessage handler, so that iframe can report its location:
  80. window.addEventListener("message", receiveMessage, false);
  81. // Point iframe at secure (HTTPS) version of testcase, & wait for callback:
  82. iframe.onload = captureSecureSnapshot;
  83. iframe.src = secureURI;
  84. }
  85. function captureSecureSnapshot() {
  86. // Capture snapshot of iframe showing always-HTTPS version of testcase:
  87. secureSnapshot = snapshotWindow(iframeWin);
  88. assertSnapshots(secureSnapshot, refSnapshot,
  89. true /*equal*/, null /*no fuzz*/,
  90. "secureSnapshot", "refSnapshot");
  91. // Point iframe at insecure (HTTP) version of testcase (which should get
  92. // automatically upgraded to secure (HTTPS) under the hood), & wait for
  93. // callback:
  94. iframe.onload = captureUpgradedSnapshot;
  95. iframe.src = insecureURI;
  96. }
  97. function captureUpgradedSnapshot() {
  98. // Double-check that iframe is really pointed at insecure URI, to be sure
  99. // we're actually exercising HSTS. (Note that receiveMessage() will make
  100. // sure it's been upgraded to a secure HTTPS URI under the hood.)
  101. is(iframe.src, insecureURI,
  102. "test should've attempted to load insecure HTTP URI, to exercise HSTS");
  103. // Capture snapshot of iframe showing upgraded-to-HTTPS version of testcase:
  104. upgradedSnapshot = snapshotWindow(iframeWin);
  105. assertSnapshots(upgradedSnapshot, refSnapshot,
  106. true /*equal*/, null /*no fuzz*/,
  107. "upgradedSnapshot", "refSnapshot");
  108. cleanupAndFinish();
  109. }
  110. function cleanupAndFinish() {
  111. is(numPostMessageCalls, expectedNumPostMessageCalls,
  112. "didn't receive as many messages from child iframe as expected");
  113. SpecialPowers.cleanUpSTSData("http://example.com");
  114. SimpleTest.finish();
  115. }
  116. runTest();
  117. </script>
  118. </body>
  119. </html>