@@ -56,7 +56,6 @@ public function testGetDefaultPolicyWithPolicies() {
5656 $ policy = new \OCP \AppFramework \Http \ContentSecurityPolicy ();
5757 $ policy ->addAllowedFontDomain ('example.com ' );
5858 $ policy ->addAllowedImageDomain ('example.org ' );
59- $ policy ->allowInlineScript (true );
6059 $ policy ->allowEvalScript (true );
6160 $ this ->contentSecurityPolicyManager ->addDefaultPolicy ($ policy );
6261 $ policy = new \OCP \AppFramework \Http \EmptyContentSecurityPolicy ();
@@ -66,7 +65,6 @@ public function testGetDefaultPolicyWithPolicies() {
6665 $ this ->contentSecurityPolicyManager ->addDefaultPolicy ($ policy );
6766
6867 $ expected = new \OC \Security \CSP \ContentSecurityPolicy ();
69- $ expected ->allowInlineScript (true );
7068 $ expected ->allowEvalScript (true );
7169 $ expected ->addAllowedFontDomain ('mydomain.com ' );
7270 $ expected ->addAllowedFontDomain ('example.com ' );
@@ -75,7 +73,7 @@ public function testGetDefaultPolicyWithPolicies() {
7573 $ expected ->addAllowedImageDomain ('anotherdomain.de ' );
7674 $ expected ->addAllowedImageDomain ('example.org ' );
7775 $ expected ->addAllowedChildSrcDomain ('childdomain ' );
78- $ expectedStringPolicy = "default-src 'none';base-uri 'none';manifest-src 'self';script-src 'self' 'unsafe-inline' 'unsafe- eval';style-src 'self' 'unsafe-inline';img-src 'self' data: blob: anotherdomain.de example.org;font-src 'self' data: mydomain.com example.com anotherFontDomain;connect-src 'self';media-src 'self';child-src childdomain;frame-ancestors 'self';form-action 'self' thirdDomain " ;
76+ $ expectedStringPolicy = "default-src 'none';base-uri 'none';manifest-src 'self';script-src 'self' 'unsafe-eval';style-src 'self' 'unsafe-inline';img-src 'self' data: blob: anotherdomain.de example.org;font-src 'self' data: mydomain.com example.com anotherFontDomain;connect-src 'self';media-src 'self';child-src childdomain;frame-ancestors 'self';form-action 'self' thirdDomain " ;
7977
8078 $ this ->assertEquals ($ expected , $ this ->contentSecurityPolicyManager ->getDefaultPolicy ());
8179 $ this ->assertSame ($ expectedStringPolicy , $ this ->contentSecurityPolicyManager ->getDefaultPolicy ()->buildPolicy ());
@@ -96,7 +94,6 @@ public function testGetDefaultPolicyWithPoliciesViaEvent() {
9694 $ policy = new \OCP \AppFramework \Http \ContentSecurityPolicy ();
9795 $ policy ->addAllowedFontDomain ('example.com ' );
9896 $ policy ->addAllowedImageDomain ('example.org ' );
99- $ policy ->allowInlineScript (true );
10097 $ policy ->allowEvalScript (false );
10198 $ e ->addPolicy ($ policy );
10299 });
@@ -110,7 +107,6 @@ public function testGetDefaultPolicyWithPoliciesViaEvent() {
110107 });
111108
112109 $ expected = new \OC \Security \CSP \ContentSecurityPolicy ();
113- $ expected ->allowInlineScript (true );
114110 $ expected ->allowEvalScript (true );
115111 $ expected ->addAllowedFontDomain ('mydomain.com ' );
116112 $ expected ->addAllowedFontDomain ('example.com ' );
@@ -120,7 +116,7 @@ public function testGetDefaultPolicyWithPoliciesViaEvent() {
120116 $ expected ->addAllowedChildSrcDomain ('childdomain ' );
121117 $ expected ->addAllowedFormActionDomain ('thirdDomain ' );
122118 $ expected ->useStrictDynamic (true );
123- $ expectedStringPolicy = "default-src 'none';base-uri 'none';manifest-src 'self';script-src 'self' 'unsafe-inline' 'unsafe- eval';style-src 'self' 'unsafe-inline';img-src 'self' data: blob: anotherdomain.de example.org;font-src 'self' data: mydomain.com example.com anotherFontDomain;connect-src 'self';media-src 'self';child-src childdomain;frame-ancestors 'self';form-action 'self' thirdDomain " ;
119+ $ expectedStringPolicy = "default-src 'none';base-uri 'none';manifest-src 'self';script-src 'self' 'unsafe-eval';style-src 'self' 'unsafe-inline';img-src 'self' data: blob: anotherdomain.de example.org;font-src 'self' data: mydomain.com example.com anotherFontDomain;connect-src 'self';media-src 'self';child-src childdomain;frame-ancestors 'self';form-action 'self' thirdDomain " ;
124120
125121 $ this ->assertEquals ($ expected , $ this ->contentSecurityPolicyManager ->getDefaultPolicy ());
126122 $ this ->assertSame ($ expectedStringPolicy , $ this ->contentSecurityPolicyManager ->getDefaultPolicy ()->buildPolicy ());
0 commit comments