/** * Copyright 2017 Google Inc. All Rights Reserved. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * http://www.apache.org/licenses/LICENSE-2.0 * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ import * as Comlink from "/base/dist/esm/comlink.mjs"; describe("Comlink origin filtering", function () { it("rejects messages from unknown origin", async function () { // expose on our window so comlink is listening to window postmessage const obj = { my: "value" }; Comlink.expose(obj, self, [/^http:\/\/localhost(:[0-9]+)?\/?$/]); let handler; // juggle async timings to get the attack started const attackComplete = new Promise((resolve, reject) => { handler = (ev) => { if (ev.data === "ready" && ev.origin === "null") { // tell the iframe it can start the attack ifr.contentWindow.postMessage("start", "*"); } else if (ev.data === "done") { // confirm the attack failed, the prototype was not updated expect(Object.prototype.foo).to.be.undefined; expect(obj.my).to.equal("value"); resolve(); } }; window.addEventListener("message", handler); }); // create a sandboxed iframe for the attack const ifr = document.createElement("iframe"); ifr.sandbox.add("allow-scripts"); ifr.src = "/base/tests/fixtures/attack-iframe.html"; document.body.appendChild(ifr); // wait for the iframe to load await new Promise((resolve) => (ifr.onload = resolve)); // and wait for the attack to complete await attackComplete; window.removeEventListener("message", handler); ifr.remove(); }); it("accepts messages from matching origin", async function () { // expose on our window so comlink is listening to window postmessage const obj = { my: "value" }; Comlink.expose(obj, self, [/^http:\/\/localhost(:[0-9]+)?\/?$/]); let handler; // juggle async timings to get the attack started const attackComplete = new Promise((resolve, reject) => { handler = (ev) => { if (ev.data === "ready" && ev.origin === window.origin) { // tell the iframe it can start the attack ifr.contentWindow.postMessage("start", "*"); } else if (ev.data === "done") { // confirm the attack succeeded, the prototype was updated expect(Object.prototype.foo).to.equal("x"); expect(obj.my).to.equal("value"); resolve(); } }; window.addEventListener("message", handler); }); // create a sandboxed iframe for the attack, but with same origin const ifr = document.createElement("iframe"); ifr.sandbox.add("allow-scripts", "allow-same-origin"); ifr.src = "/base/tests/fixtures/attack-iframe.html"; document.body.appendChild(ifr); // wait for the iframe to load await new Promise((resolve) => (ifr.onload = resolve)); // and wait for the attack to complete await attackComplete; window.removeEventListener("message", handler); ifr.remove(); }); });