You are here

class SecKitTestCase in Security Kit 7

Same name and namespace in other branches
  1. 6 seckit.test \SecKitTestCase

Functional tests for Security Kit.

Hierarchy

Expanded class hierarchy of SecKitTestCase

File

./seckit.test, line 10
Tests for Security Kit module.

View source
class SecKitTestCase extends DrupalWebTestCase {

  /**
   * Admin user for tests
   * @var object
   */
  private $admin;

  /**
   * Implements getInfo().
   * @see DrupalWebTestCase::getInfo()
   */
  public static function getInfo() {
    return array(
      'name' => t('Security Kit functionality'),
      'description' => t('Tests functionality and settings page of Security Kit module.'),
      'group' => t('Security Kit'),
    );
  }

  /**
   * Implements setUp().
   * @see DrupalWebTestCase::setUp()
   */
  public function setUp() {
    variable_set('clean_url', 1);
    parent::setUp('seckit');
    $this->admin = $this
      ->drupalCreateUser(array(
      'administer seckit',
    ));
    $this
      ->drupalLogin($this->admin);
  }

  /**
   * Tests disabled Content Security Policy.
   */
  public function testDisabledCSP() {
    $form['seckit_xss[csp][checkbox]'] = FALSE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('Content-Security-Policy'), t('Content Security Policy is disabled.'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-Content-Security-Policy'), t('Content Security Policy is disabled.'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-WebKit-CSP'), t('Content Security Policy is disabled.'));
  }

  /**
   * Tests Content Security Policy with all enabled directives.
   */
  public function testCSPHasAllDirectives() {
    $form = array(
      'seckit_xss[csp][checkbox]' => TRUE,
      'seckit_xss[csp][vendor-prefix][x]' => TRUE,
      'seckit_xss[csp][vendor-prefix][webkit]' => TRUE,
      'seckit_xss[csp][default-src]' => '*',
      'seckit_xss[csp][script-src]' => '*',
      'seckit_xss[csp][object-src]' => '*',
      'seckit_xss[csp][style-src]' => '*',
      'seckit_xss[csp][img-src]' => '*',
      'seckit_xss[csp][media-src]' => '*',
      'seckit_xss[csp][frame-src]' => '*',
      'seckit_xss[csp][frame-ancestors]' => '*',
      'seckit_xss[csp][child-src]' => '*',
      'seckit_xss[csp][font-src]' => '*',
      'seckit_xss[csp][connect-src]' => '*',
      'seckit_xss[csp][report-uri]' => SECKIT_CSP_REPORT_URL,
      'seckit_xss[csp][upgrade-req]' => TRUE,
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $expected = 'default-src *; script-src *; object-src *; style-src *; img-src *; media-src *; frame-src *; frame-ancestors *; child-src *; font-src *; connect-src *; report-uri ' . base_path() . SECKIT_CSP_REPORT_URL . '; upgrade-insecure-requests';
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has all the directves.'));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-Content-Security-Policy'), t('X-Content-Security-Policy has all the directves.'));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-WebKit-CSP'), t('X-WebKit-CSP has all the directves.'));
  }

  /**
   * Tests Content Security Policy with policy-uri directive.
   * In this case, only policy-uri directive should be present.
   */
  public function testCSPPolicyUriDirectiveOnly() {
    $form = array(
      'seckit_xss[csp][checkbox]' => TRUE,
      'seckit_xss[csp][vendor-prefix][x]' => TRUE,
      'seckit_xss[csp][vendor-prefix][webkit]' => TRUE,
      'seckit_xss[csp][default-src]' => '*',
      'seckit_xss[csp][script-src]' => '*',
      'seckit_xss[csp][object-src]' => '*',
      'seckit_xss[csp][style-src]' => '*',
      'seckit_xss[csp][img-src]' => '*',
      'seckit_xss[csp][media-src]' => '*',
      'seckit_xss[csp][frame-src]' => '*',
      'seckit_xss[csp][frame-ancestors]' => '*',
      'seckit_xss[csp][child-src]' => '*',
      'seckit_xss[csp][font-src]' => '*',
      'seckit_xss[csp][connect-src]' => '*',
      'seckit_xss[csp][report-uri]' => SECKIT_CSP_REPORT_URL,
      'seckit_xss[csp][policy-uri]' => 'csp.xml',
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $expected = 'policy-uri ' . base_path() . 'csp.xml';
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has only policy-uri.'));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-Content-Security-Policy'), t('X-Content-Security-Policy has only policy-uri.'));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-WebKit-CSP'), t('X-WebKit-CSP has only policy-uri(Chrome and Safari).'));
  }

  /**
   * Tests for report-uri directive of Content Security Policy.
   *
   * report-uri can be relative to Drupal's base URI or it can be an absolute
   * URI.
   */
  public function testCSPReportUriDirectiveOnly() {

    // report-uri is report-csp-violation
    $base_form = array(
      'seckit_xss[csp][checkbox]' => TRUE,
      'seckit_xss[csp][vendor-prefix][x]' => TRUE,
      'seckit_xss[csp][vendor-prefix][webkit]' => TRUE,
      'seckit_xss[csp][default-src]' => '*',
      'seckit_xss[csp][script-src]' => '*',
      'seckit_xss[csp][object-src]' => '*',
      'seckit_xss[csp][style-src]' => '*',
      'seckit_xss[csp][img-src]' => '*',
      'seckit_xss[csp][media-src]' => '*',
      'seckit_xss[csp][frame-src]' => '*',
      'seckit_xss[csp][frame-ancestors]' => '*',
      'seckit_xss[csp][child-src]' => '*',
      'seckit_xss[csp][font-src]' => '*',
      'seckit_xss[csp][connect-src]' => '*',
      'seckit_xss[csp][report-uri]' => SECKIT_CSP_REPORT_URL,
    );

    // First test.  No report-uri has been specified.
    $form_for_test0 = $base_form;
    $this
      ->drupalPost('admin/config/system/seckit', $form_for_test0, t('Save configuration'));
    $expected = 'default-src *; script-src *; object-src *; style-src *; img-src *; media-src *; frame-src *; frame-ancestors *; child-src *; font-src *; connect-src *; report-uri ' . url(SECKIT_CSP_REPORT_URL);
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has default report-uri directive.'));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-Content-Security-Policy'), t('X-Content-Security-Policy has default report-uri directive.'));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-WebKit-CSP'), t('X-WebKit-CSP has default report-uri directive.'));

    // Second test.  A valid internal path "node" has been specified as the
    // report-uri.
    $form_for_test1 = $base_form;
    $report_uri_for_test1 = 'node';
    $form_for_test1['seckit_xss[csp][report-uri]'] = $report_uri_for_test1;
    $this
      ->drupalPost('admin/config/system/seckit', $form_for_test1, t('Save configuration'));
    $expected_report_uri_for_test1 = url($report_uri_for_test1);
    $expected = 'default-src *; script-src *; object-src *; style-src *; img-src *; media-src *; frame-src *; frame-ancestors *; child-src *; font-src *; connect-src *; report-uri ' . $expected_report_uri_for_test1;
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test1,
    )));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-Content-Security-Policy'), t('X-Content-Security-Policy has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test1,
    )));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-WebKit-CSP'), t('X-WebKit-CSP has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test1,
    )));

    // Third test.  A non-existent internal path "foo/bar/report-csp-violation"
    // has been specified as the report-uri.
    $form_for_test2 = $base_form;
    $report_uri_for_test2 = 'foo/bar/report-csp-violation';
    $form_for_test2['seckit_xss[csp][report-uri]'] = $report_uri_for_test2;
    $this
      ->drupalPost('admin/config/system/seckit', $form_for_test2, t('Save configuration'));
    $expected_err_msg = t('Non-existent path for report-uri given: %uri', array(
      '%uri' => $report_uri_for_test2,
    ));
    $this
      ->assertRaw($expected_err_msg, 'Non-existent report-uri path should be rejected.');

    // Fourth test.  report-uri is https://report-uri.io/report/DrupalSeckitTest
    $form_for_test3 = $base_form;
    $report_uri_for_test3 = 'https://report-uri.io/report/DrupalSeckitTest';
    $form_for_test3['seckit_xss[csp][report-uri]'] = $report_uri_for_test3;
    $this
      ->drupalPost('admin/config/system/seckit', $form_for_test3, t('Save configuration'));
    $expected_report_uri_for_test3 = $report_uri_for_test3;
    $expected = 'default-src *; script-src *; object-src *; style-src *; img-src *; media-src *; frame-src *; frame-ancestors *; child-src *; font-src *; connect-src *; report-uri ' . $expected_report_uri_for_test3;
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test3,
    )));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-Content-Security-Policy'), t('X-Content-Security-Policy has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test3,
    )));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-WebKit-CSP'), t('X-WebKit-CSP has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test3,
    )));

    // Another test.  report-uri is http://report-uri.io/report/DrupalSeckitTest
    $form_for_test4 = $base_form;
    $report_uri_for_test4 = 'http://report-uri.io/report/DrupalSeckitTest';
    $form_for_test4['seckit_xss[csp][report-uri]'] = $report_uri_for_test4;
    $this
      ->drupalPost('admin/config/system/seckit', $form_for_test4, t('Save configuration'));
    $expected_report_uri_for_test4 = $report_uri_for_test4;
    $expected = 'default-src *; script-src *; object-src *; style-src *; img-src *; media-src *; frame-src *; frame-ancestors *; child-src *; font-src *; connect-src *; report-uri ' . $expected_report_uri_for_test4;
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test4,
    )));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-Content-Security-Policy'), t('X-Content-Security-Policy has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test4,
    )));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-WebKit-CSP'), t('X-WebKit-CSP has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test4,
    )));

    // Last test.  report-uri is //report-uri.io/report/DrupalSeckitTest
    $form_for_test5 = $base_form;
    $report_uri_for_test5 = '//report-uri.io/report/DrupalSeckitTest';
    $form_for_test5['seckit_xss[csp][report-uri]'] = $report_uri_for_test5;
    $this
      ->drupalPost('admin/config/system/seckit', $form_for_test5, t('Save configuration'));
    $expected_report_uri_for_test5 = $report_uri_for_test5;
    $expected = 'default-src *; script-src *; object-src *; style-src *; img-src *; media-src *; frame-src *; frame-ancestors *; child-src *; font-src *; connect-src *; report-uri ' . $expected_report_uri_for_test5;
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test5,
    )));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-Content-Security-Policy'), t('X-Content-Security-Policy has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test5,
    )));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-WebKit-CSP'), t('X-WebKit-CSP has %uri as report-uri directive.', array(
      '%uri' => $expected_report_uri_for_test5,
    )));
  }

  /**
   * Tests Content Security Policy with all directives empty.
   * In this case, we should revert back to default values.
   */
  public function testCSPAllDirectivesEmpty() {
    $form = array(
      'seckit_xss[csp][checkbox]' => TRUE,
      'seckit_xss[csp][vendor-prefix][x]' => FALSE,
      'seckit_xss[csp][vendor-prefix][webkit]' => FALSE,
      'seckit_xss[csp][default-src]' => '',
      'seckit_xss[csp][script-src]' => '',
      'seckit_xss[csp][object-src]' => '',
      'seckit_xss[csp][img-src]' => '',
      'seckit_xss[csp][media-src]' => '',
      'seckit_xss[csp][style-src]' => '',
      'seckit_xss[csp][frame-src]' => '',
      'seckit_xss[csp][frame-ancestors]' => '',
      'seckit_xss[csp][child-src]' => '',
      'seckit_xss[csp][font-src]' => '',
      'seckit_xss[csp][connect-src]' => '',
      'seckit_xss[csp][report-uri]' => '',
      'seckit_xss[csp][policy-uri]' => '',
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $expected = "default-src 'self'; report-uri " . base_path() . SECKIT_CSP_REPORT_URL;
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has default directive.'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-Content-Security-Policy'), t('Vendor prefixed X-Content-Security-Policy header is disabled.'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-WebKit-CSP'), t('Vendor prefixed X-Webkit-CSP header is disabled.'));
  }

  /**
   * Tests Content Security Policy with one vendor-prefixed header enabled.
   *
   * The enabled headers should contain default values.
   */
  public function testCSPVendorPrefixWebkitAllDirectivesEmpty() {
    $form = array(
      'seckit_xss[csp][checkbox]' => TRUE,
      'seckit_xss[csp][vendor-prefix][x]' => FALSE,
      'seckit_xss[csp][vendor-prefix][webkit]' => TRUE,
      'seckit_xss[csp][default-src]' => '',
      'seckit_xss[csp][script-src]' => '',
      'seckit_xss[csp][object-src]' => '',
      'seckit_xss[csp][img-src]' => '',
      'seckit_xss[csp][media-src]' => '',
      'seckit_xss[csp][style-src]' => '',
      'seckit_xss[csp][frame-src]' => '',
      'seckit_xss[csp][frame-ancestors]' => '',
      'seckit_xss[csp][child-src]' => '',
      'seckit_xss[csp][font-src]' => '',
      'seckit_xss[csp][connect-src]' => '',
      'seckit_xss[csp][report-uri]' => '',
      'seckit_xss[csp][policy-uri]' => '',
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $expected = "default-src 'self'; report-uri " . base_path() . SECKIT_CSP_REPORT_URL;
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has default directive.'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-Content-Security-Policy'), t('Vendor prefixed X-Content-Security-Policy header is disabled.'));
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('X-WebKit-CSP'), t('X-WebKit-CSP has default directve.'));
  }

  /**
   * Tests Content Security Policy in report-only mode.
   */
  public function testReportOnlyCSP() {
    $form['seckit_xss[csp][checkbox]'] = TRUE;
    $form['seckit_xss[csp][report-only]'] = TRUE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertTrue($this
      ->drupalGetHeader('Content-Security-Policy-Report-Only'), t('Content Security Policy is in report-only mode.'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-Content-Security-Policy'), t('Vendor prefixed X-Content-Security-Policy header is disabled.'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-WebKit-CSP'), t('Vendor prefixed X-Webkit-CSP header is disabled.'));
  }

  /**
   * Tests Content Security Policy with upgrade-insecure-requests directive.
   * In this case, only upgrade-insecure-requests directive should be present.
   */
  public function testCSPUpgradeInsecureRequestsDirectiveOnly() {
    $form['seckit_xss[csp][checkbox]'] = TRUE;
    $form['seckit_xss[csp][upgrade-req]'] = TRUE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $expected = "default-src 'self'; report-uri " . base_path() . SECKIT_CSP_REPORT_URL . '; upgrade-insecure-requests';
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Content-Security-Policy'), t('Content-Security-Policy has defaults plus upgrade-insecure-requests.'));
  }

  /**
   * Tests disabled X-XSS-Protection HTTP response header.
   */
  public function testXXSSProtectionIsDisabled() {
    $form['seckit_xss[x_xss][select]'] = SECKIT_X_XSS_DISABLE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-XSS-Protection'), t('X-XSS-Protection is disabled.'));
  }

  /**
   * Tests set to 0 X-XSS-Protection HTTP response header.
   */
  public function testXXSSProtectionIs0() {
    $form['seckit_xss[x_xss][select]'] = SECKIT_X_XSS_0;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertEqual(0, $this
      ->drupalGetHeader('X-XSS-Protection'), t('X-XSS-Protection is set to 0.'));
  }

  /**
   * Tests set to 1 X-XSS-Protection HTTP response header.
   */
  public function testXXSSProtectionIs1() {
    $form['seckit_xss[x_xss][select]'] = SECKIT_X_XSS_1;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertEqual('1', $this
      ->drupalGetHeader('X-XSS-Protection'), t('X-XSS-Protection is set to 1.'));
  }

  /**
   * Tests set to 1; mode=block X-XSS-Protection HTTP response header.
   */
  public function testXXSSProtectionIs1Block() {
    $form['seckit_xss[x_xss][select]'] = SECKIT_X_XSS_1_BLOCK;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertEqual('1; mode=block', $this
      ->drupalGetHeader('X-XSS-Protection'), t('X-XSS-Protection is set to 1; mode=block.'));
  }

  /**
   * Tests HTTP Origin allows requests from the site.
   */
  public function testOriginAllowsSite() {
    global $base_root;
    $form['seckit_csrf[origin]'] = TRUE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'), array(), array(
      'Origin: ' . $base_root,
    ));
    $this
      ->assertResponse(200, t('Request is allowed.'));
  }

  /**
   * Tests HTTP Origin allows requests from the specified source.
   */
  public function testOriginAllowsSpecifiedSource() {
    $form = array(
      'seckit_csrf[origin]' => TRUE,
      'seckit_csrf[origin_whitelist]' => 'http://www.example.com',
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'), array(), array(
      'Origin: http://www.example.com',
    ));
    $this
      ->assertResponse(200, t('Whitelisted request is allowed.'));
  }

  /**
   * Tests HTTP Origin allows requests from the specified source, with multiple
   * values in the whitelist.
   */
  public function testOriginAllowsSpecifiedSourceMultiWhitelist() {
    $form = array(
      'seckit_csrf[origin]' => TRUE,
      'seckit_csrf[origin_whitelist]' => 'http://www.example.com, https://www.example.com, https://example.com:8080',
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'), array(), array(
      'Origin: https://www.example.com',
    ));
    $this
      ->assertResponse(200, t('Whitelisted request is allowed.'));
  }

  /**
   * Tests HTTP Origin denies request.
   */
  public function testOriginDeny() {
    $form['seckit_csrf[origin]'] = TRUE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'), array(), array(
      'Origin: http://www.example.com',
    ));
    $this
      ->assertEqual(array(), $_POST, t('POST is empty.'));
    $this
      ->assertResponse(403, t('Request is denied.'));
  }

  /**
   * Tests disabled X-Frame-Options HTTP response header.
   */
  public function testXFrameOptionsIsDisabled() {
    $form['seckit_clickjacking[x_frame]'] = SECKIT_X_FRAME_DISABLE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('X-Frame-Options'), t('X-Frame-Options is disabled.'));
  }

  /**
   * Tests set to SAMEORIGIN X-Frame-Options HTTP response header.
   */
  public function testXFrameOptionsIsSameOrigin() {
    $form['seckit_clickjacking[x_frame]'] = SECKIT_X_FRAME_SAMEORIGIN;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertEqual('SAMEORIGIN', $this
      ->drupalGetHeader('X-Frame-Options'), t('X-Frame-Options is set to SAMEORIGIN.'));
  }

  /**
   * Tests set to DENY X-Frame-Options HTTP response header.
   */
  public function testXFrameOptionsIsDeny() {
    $form['seckit_clickjacking[x_frame]'] = SECKIT_X_FRAME_DENY;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertEqual('DENY', $this
      ->drupalGetHeader('X-Frame-Options'), t('X-Frame-Options is set to DENY.'));
  }

  /**
   * Tests set to ALLOW-FROM X-Frame-Options HTTP response header.
   */
  public function testXFrameOptionsIsAllowFrom() {
    $form['seckit_clickjacking[x_frame]'] = SECKIT_X_FRAME_ALLOW_FROM;
    $form['seckit_clickjacking[x_frame_allow_from]'] = 'http://www.google.com';
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertEqual('ALLOW-FROM http://www.google.com', $this
      ->drupalGetHeader('X-Frame-Options'), t('X-Frame-Options is set to ALLOW-FROM.'));
  }

  /**
   * Tests JS + CSS + Noscript protection.
   */
  public function testJSCSSNoscript() {
    $form['seckit_clickjacking[js_css_noscript]'] = TRUE;
    $form['seckit_clickjacking[noscript_message]'] = 'Sorry, your JavaScript is disabled.';
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));

    // Reset settings.
    _seckit_get_options(TRUE);

    // Get the new JS code.
    $code = _seckit_get_js_css_noscript_code();
    $this
      ->assertRaw($code, t('JavaScript + CSS + Noscript protection is loaded.'));
  }

  /**
   * Tests disabled HTTP Strict Transport Security.
   */
  public function testDisabledHSTS() {
    $form['seckit_ssl[hsts]'] = FALSE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('Strict-Transport-Security'), t('HTTP Strict Transport Security is disabled.'));
  }

  /**
   * Tests HTTP Strict Transport Security has all directives.
   */
  public function testHSTSAllDirectves() {
    $form = array(
      'seckit_ssl[hsts]' => TRUE,
      'seckit_ssl[hsts_max_age]' => 1000,
      'seckit_ssl[hsts_subdomains]' => 1,
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $expected = 'max-age=1000; includeSubDomains';
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Strict-Transport-Security'), t('HTTP Strict Transport Security has all the directives.'));
  }

  /**
   * Tests disabled From-Origin.
   */
  public function testDisabledFromOrigin() {
    $form['seckit_various[from_origin]'] = FALSE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('From-Origin'), t('From-Origin is disabled.'));
  }

  /**
   * Tests enabled From-Origin.
   */
  public function testEnabledFromOrigin() {
    $form = array(
      'seckit_various[from_origin]' => TRUE,
      'seckit_various[from_origin_destination]' => 'same',
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertEqual('same', $this
      ->drupalGetHeader('From-Origin'), t('From-Origin is enabled and set to same.'));
  }

  /**
   * Tests disabled Referrer-Policy HTTP response header.
   */
  public function testReferrerPolicyIsDisabled() {
    $form['seckit_various[referrer_policy]'] = FALSE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('Referrer-Policy'), t('Referrer-Policy is disabled.'));
  }

  /**
   * Tests enabled Referrer-Policy HTTP response header.
   */
  public function testReferrerPolicyIsEnabled() {
    $form['seckit_various[referrer_policy]'] = TRUE;
    $form['seckit_various[referrer_policy_policy]'] = 'no-referrer-when-downgrade';
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertEqual('no-referrer-when-downgrade', $this
      ->drupalGetHeader('Referrer-Policy'), t('Referrer-Policy is enabled and set to no-referrer-when-downgrade.'));
  }

  /**
   * Tests disabled feature-policy.
   */
  public function testDisabledFeaturePolicy() {
    $form['seckit_fp[feature_policy]'] = FALSE;
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $this
      ->assertFalse($this
      ->drupalGetHeader('Feature-Policy'), t('Feature-Policy is disabled.'));
  }

  /**
   * Tests enabled feature-policy.
   */
  public function testEnabledFeaturePolicy() {
    $form = array(
      'seckit_fp[feature_policy]' => TRUE,
      'seckit_fp[feature_policy_policy]' => "accelerometer 'none'; camera 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; payment 'none'; usb 'none'",
    );
    $this
      ->drupalPost('admin/config/system/seckit', $form, t('Save configuration'));
    $expected = "accelerometer 'none'; camera 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; payment 'none'; usb 'none'";
    $this
      ->assertEqual($expected, $this
      ->drupalGetHeader('Feature-Policy'), t('The feature-policy header is correctly sent.'));
    debug(array(
      'expected' => $expected,
      'received' => $this
        ->drupalGetHeader('Feature-Policy'),
      'headers' => $this
        ->drupalGetHeaders(),
    ));
  }

}

Members

Namesort descending Modifiers Type Description Overrides
DrupalTestCase::$assertions protected property Assertions thrown in that test case.
DrupalTestCase::$databasePrefix protected property The database prefix of this test run.
DrupalTestCase::$originalFileDirectory protected property The original file directory, before it was changed for testing purposes.
DrupalTestCase::$results public property Current results of this test case.
DrupalTestCase::$setup protected property Flag to indicate whether the test has been set up.
DrupalTestCase::$setupDatabasePrefix protected property
DrupalTestCase::$setupEnvironment protected property
DrupalTestCase::$skipClasses protected property This class is skipped when looking for the source of an assertion.
DrupalTestCase::$testId protected property The test run ID.
DrupalTestCase::$timeLimit protected property Time limit for the test.
DrupalTestCase::$useSetupInstallationCache public property Whether to cache the installation part of the setUp() method.
DrupalTestCase::$useSetupModulesCache public property Whether to cache the modules installation part of the setUp() method.
DrupalTestCase::$verboseDirectoryUrl protected property URL to the verbose output file directory.
DrupalTestCase::assert protected function Internal helper: stores the assert.
DrupalTestCase::assertEqual protected function Check to see if two values are equal.
DrupalTestCase::assertFalse protected function Check to see if a value is false (an empty string, 0, NULL, or FALSE).
DrupalTestCase::assertIdentical protected function Check to see if two values are identical.
DrupalTestCase::assertNotEqual protected function Check to see if two values are not equal.
DrupalTestCase::assertNotIdentical protected function Check to see if two values are not identical.
DrupalTestCase::assertNotNull protected function Check to see if a value is not NULL.
DrupalTestCase::assertNull protected function Check to see if a value is NULL.
DrupalTestCase::assertTrue protected function Check to see if a value is not false (not an empty string, 0, NULL, or FALSE).
DrupalTestCase::deleteAssert public static function Delete an assertion record by message ID.
DrupalTestCase::error protected function Fire an error assertion. 1
DrupalTestCase::errorHandler public function Handle errors during test runs. 1
DrupalTestCase::exceptionHandler protected function Handle exceptions.
DrupalTestCase::fail protected function Fire an assertion that is always negative.
DrupalTestCase::generatePermutations public static function Converts a list of possible parameters into a stack of permutations.
DrupalTestCase::getAssertionCall protected function Cycles through backtrace until the first non-assertion method is found.
DrupalTestCase::getDatabaseConnection public static function Returns the database connection to the site running Simpletest.
DrupalTestCase::insertAssert public static function Store an assertion from outside the testing context.
DrupalTestCase::pass protected function Fire an assertion that is always positive.
DrupalTestCase::randomName public static function Generates a random string containing letters and numbers.
DrupalTestCase::randomString public static function Generates a random string of ASCII characters of codes 32 to 126.
DrupalTestCase::run public function Run all tests in this class.
DrupalTestCase::verbose protected function Logs a verbose message in a text file.
DrupalWebTestCase::$additionalCurlOptions protected property Additional cURL options.
DrupalWebTestCase::$content protected property The content of the page currently loaded in the internal browser.
DrupalWebTestCase::$cookieFile protected property The current cookie file used by cURL.
DrupalWebTestCase::$cookies protected property The cookies of the page currently loaded in the internal browser.
DrupalWebTestCase::$curlHandle protected property The handle of the current cURL connection.
DrupalWebTestCase::$drupalSettings protected property The value of the Drupal.settings JavaScript variable for the page currently loaded in the internal browser.
DrupalWebTestCase::$elements protected property The parsed version of the page.
DrupalWebTestCase::$generatedTestFiles protected property Whether the files were copied to the test files directory.
DrupalWebTestCase::$headers protected property The headers of the page currently loaded in the internal browser.
DrupalWebTestCase::$httpauth_credentials protected property HTTP authentication credentials (<username>:<password>).
DrupalWebTestCase::$httpauth_method protected property HTTP authentication method
DrupalWebTestCase::$loggedInUser protected property The current user logged in using the internal browser.
DrupalWebTestCase::$originalShutdownCallbacks protected property The original shutdown handlers array, before it was cleaned for testing purposes.
DrupalWebTestCase::$originalUser protected property The original user, before it was changed to a clean uid = 1 for testing purposes.
DrupalWebTestCase::$plainTextContent protected property The content of the page currently loaded in the internal browser (plain text version).
DrupalWebTestCase::$profile protected property The profile to install as a basis for testing. 20
DrupalWebTestCase::$redirect_count protected property The number of redirects followed during the handling of a request.
DrupalWebTestCase::$session_id protected property The current session ID, if available.
DrupalWebTestCase::$session_name protected property The current session name, if available.
DrupalWebTestCase::$url protected property The URL currently loaded in the internal browser.
DrupalWebTestCase::assertField protected function Asserts that a field exists with the given name or ID.
DrupalWebTestCase::assertFieldById protected function Asserts that a field exists in the current page with the given ID and value.
DrupalWebTestCase::assertFieldByName protected function Asserts that a field exists in the current page with the given name and value.
DrupalWebTestCase::assertFieldByXPath protected function Asserts that a field exists in the current page by the given XPath.
DrupalWebTestCase::assertFieldChecked protected function Asserts that a checkbox field in the current page is checked.
DrupalWebTestCase::assertLink protected function Pass if a link with the specified label is found, and optional with the specified index.
DrupalWebTestCase::assertLinkByHref protected function Pass if a link containing a given href (part) is found.
DrupalWebTestCase::assertMail protected function Asserts that the most recently sent e-mail message has the given value.
DrupalWebTestCase::assertMailPattern protected function Asserts that the most recently sent e-mail message has the pattern in it.
DrupalWebTestCase::assertMailString protected function Asserts that the most recently sent e-mail message has the string in it.
DrupalWebTestCase::assertNoDuplicateIds protected function Asserts that each HTML ID is used for just a single element.
DrupalWebTestCase::assertNoField protected function Asserts that a field does not exist with the given name or ID.
DrupalWebTestCase::assertNoFieldById protected function Asserts that a field does not exist with the given ID and value.
DrupalWebTestCase::assertNoFieldByName protected function Asserts that a field does not exist with the given name and value.
DrupalWebTestCase::assertNoFieldByXPath protected function Asserts that a field doesn't exist or its value doesn't match, by XPath.
DrupalWebTestCase::assertNoFieldChecked protected function Asserts that a checkbox field in the current page is not checked.
DrupalWebTestCase::assertNoLink protected function Pass if a link with the specified label is not found.
DrupalWebTestCase::assertNoLinkByHref protected function Pass if a link containing a given href (part) is not found.
DrupalWebTestCase::assertNoOptionSelected protected function Asserts that a select option in the current page is not checked.
DrupalWebTestCase::assertNoPattern protected function Will trigger a pass if the perl regex pattern is not present in raw content.
DrupalWebTestCase::assertNoRaw protected function Pass if the raw text is NOT found on the loaded page, fail otherwise. Raw text refers to the raw HTML that the page generated.
DrupalWebTestCase::assertNoResponse protected function Asserts the page did not return the specified response code.
DrupalWebTestCase::assertNoText protected function Pass if the text is NOT found on the text version of the page. The text version is the equivalent of what a user would see when viewing through a web browser. In other words the HTML has been filtered out of the contents.
DrupalWebTestCase::assertNoTitle protected function Pass if the page title is not the given string.
DrupalWebTestCase::assertNoUniqueText protected function Pass if the text is found MORE THAN ONCE on the text version of the page.
DrupalWebTestCase::assertOptionSelected protected function Asserts that a select option in the current page is checked.
DrupalWebTestCase::assertPattern protected function Will trigger a pass if the Perl regex pattern is found in the raw content.
DrupalWebTestCase::assertRaw protected function Pass if the raw text IS found on the loaded page, fail otherwise. Raw text refers to the raw HTML that the page generated.
DrupalWebTestCase::assertResponse protected function Asserts the page responds with the specified response code.
DrupalWebTestCase::assertText protected function Pass if the text IS found on the text version of the page. The text version is the equivalent of what a user would see when viewing through a web browser. In other words the HTML has been filtered out of the contents.
DrupalWebTestCase::assertTextHelper protected function Helper for assertText and assertNoText.
DrupalWebTestCase::assertThemeOutput protected function Asserts themed output.
DrupalWebTestCase::assertTitle protected function Pass if the page title is the given string.
DrupalWebTestCase::assertUniqueText protected function Pass if the text is found ONLY ONCE on the text version of the page.
DrupalWebTestCase::assertUniqueTextHelper protected function Helper for assertUniqueText and assertNoUniqueText.
DrupalWebTestCase::assertUrl protected function Pass if the internal browser's URL matches the given path.
DrupalWebTestCase::buildXPathQuery protected function Builds an XPath query.
DrupalWebTestCase::changeDatabasePrefix protected function Changes the database connection to the prefixed one.
DrupalWebTestCase::checkForMetaRefresh protected function Check for meta refresh tag and if found call drupalGet() recursively. This function looks for the http-equiv attribute to be set to "Refresh" and is case-sensitive.
DrupalWebTestCase::checkPermissions protected function Check to make sure that the array of permissions are valid.
DrupalWebTestCase::clickLink protected function Follows a link by name.
DrupalWebTestCase::constructFieldXpath protected function Helper function: construct an XPath for the given set of attributes and value.
DrupalWebTestCase::copySetupCache protected function Copy the setup cache from/to another table and files directory.
DrupalWebTestCase::cronRun protected function Runs cron in the Drupal installed by Simpletest.
DrupalWebTestCase::curlClose protected function Close the cURL handler and unset the handler.
DrupalWebTestCase::curlExec protected function Initializes and executes a cURL request.
DrupalWebTestCase::curlHeaderCallback protected function Reads headers and registers errors received from the tested site.
DrupalWebTestCase::curlInitialize protected function Initializes the cURL connection.
DrupalWebTestCase::drupalCompareFiles protected function Compare two files based on size and file name.
DrupalWebTestCase::drupalCreateContentType protected function Creates a custom content type based on default settings.
DrupalWebTestCase::drupalCreateNode protected function Creates a node based on default settings.
DrupalWebTestCase::drupalCreateRole protected function Creates a role with specified permissions.
DrupalWebTestCase::drupalCreateUser protected function Create a user with a given set of permissions.
DrupalWebTestCase::drupalGet protected function Retrieves a Drupal path or an absolute path.
DrupalWebTestCase::drupalGetAJAX protected function Retrieve a Drupal path or an absolute path and JSON decode the result.
DrupalWebTestCase::drupalGetContent protected function Gets the current raw HTML of requested page.
DrupalWebTestCase::drupalGetHeader protected function Gets the value of an HTTP response header. If multiple requests were required to retrieve the page, only the headers from the last request will be checked by default. However, if TRUE is passed as the second argument, all requests will be processed…
DrupalWebTestCase::drupalGetHeaders protected function Gets the HTTP response headers of the requested page. Normally we are only interested in the headers returned by the last request. However, if a page is redirected or HTTP authentication is in use, multiple requests will be required to retrieve the…
DrupalWebTestCase::drupalGetMails protected function Gets an array containing all e-mails sent during this test case.
DrupalWebTestCase::drupalGetNodeByTitle function Get a node from the database based on its title.
DrupalWebTestCase::drupalGetSettings protected function Gets the value of the Drupal.settings JavaScript variable for the currently loaded page.
DrupalWebTestCase::drupalGetTestFiles protected function Get a list files that can be used in tests.
DrupalWebTestCase::drupalGetToken protected function Generate a token for the currently logged in user.
DrupalWebTestCase::drupalHead protected function Retrieves only the headers for a Drupal path or an absolute path.
DrupalWebTestCase::drupalLogin protected function Log in a user with the internal browser.
DrupalWebTestCase::drupalLogout protected function
DrupalWebTestCase::drupalPost protected function Execute a POST request on a Drupal page. It will be done as usual POST request with SimpleBrowser.
DrupalWebTestCase::drupalPostAJAX protected function Execute an Ajax submission.
DrupalWebTestCase::drupalSetContent protected function Sets the raw HTML content. This can be useful when a page has been fetched outside of the internal browser and assertions need to be made on the returned page.
DrupalWebTestCase::drupalSetSettings protected function Sets the value of the Drupal.settings JavaScript variable for the currently loaded page.
DrupalWebTestCase::getAbsoluteUrl protected function Takes a path and returns an absolute path.
DrupalWebTestCase::getAllOptions protected function Get all option elements, including nested options, in a select.
DrupalWebTestCase::getSelectedItem protected function Get the selected value from a select field.
DrupalWebTestCase::getSetupCacheKey protected function Returns the cache key used for the setup caching.
DrupalWebTestCase::getUrl protected function Get the current URL from the cURL handler.
DrupalWebTestCase::handleForm protected function Handle form input related to drupalPost(). Ensure that the specified fields exist and attempt to create POST data in the correct manner for the particular field type.
DrupalWebTestCase::loadSetupCache protected function Copies the cached tables and files for a cached installation setup.
DrupalWebTestCase::parse protected function Parse content returned from curlExec using DOM and SimpleXML.
DrupalWebTestCase::preloadRegistry protected function Preload the registry from the testing site.
DrupalWebTestCase::prepareDatabasePrefix protected function Generates a database prefix for running tests.
DrupalWebTestCase::prepareEnvironment protected function Prepares the current environment for running the test.
DrupalWebTestCase::recursiveDirectoryCopy protected function Recursively copy one directory to another.
DrupalWebTestCase::refreshVariables protected function Refresh the in-memory set of variables. Useful after a page request is made that changes a variable in a different thread. 1
DrupalWebTestCase::resetAll protected function Reset all data structures after having enabled new modules.
DrupalWebTestCase::storeSetupCache protected function Store the installation setup to a cache.
DrupalWebTestCase::tearDown protected function Delete created files and temporary files directory, delete the tables created by setUp(), and reset the database prefix. 6
DrupalWebTestCase::verboseEmail protected function Outputs to verbose the most recent $count emails sent.
DrupalWebTestCase::xpath protected function Perform an xpath search on the contents of the internal browser. The search is relative to the root element (HTML tag normally) of the page.
DrupalWebTestCase::__construct function Constructor for DrupalWebTestCase. Overrides DrupalTestCase::__construct 1
SecKitTestCase::$admin private property Admin user for tests
SecKitTestCase::getInfo public static function Implements getInfo().
SecKitTestCase::setUp public function Implements setUp(). Overrides DrupalWebTestCase::setUp
SecKitTestCase::testCSPAllDirectivesEmpty public function Tests Content Security Policy with all directives empty. In this case, we should revert back to default values.
SecKitTestCase::testCSPHasAllDirectives public function Tests Content Security Policy with all enabled directives.
SecKitTestCase::testCSPPolicyUriDirectiveOnly public function Tests Content Security Policy with policy-uri directive. In this case, only policy-uri directive should be present.
SecKitTestCase::testCSPReportUriDirectiveOnly public function Tests for report-uri directive of Content Security Policy.
SecKitTestCase::testCSPUpgradeInsecureRequestsDirectiveOnly public function Tests Content Security Policy with upgrade-insecure-requests directive. In this case, only upgrade-insecure-requests directive should be present.
SecKitTestCase::testCSPVendorPrefixWebkitAllDirectivesEmpty public function Tests Content Security Policy with one vendor-prefixed header enabled.
SecKitTestCase::testDisabledCSP public function Tests disabled Content Security Policy.
SecKitTestCase::testDisabledFeaturePolicy public function Tests disabled feature-policy.
SecKitTestCase::testDisabledFromOrigin public function Tests disabled From-Origin.
SecKitTestCase::testDisabledHSTS public function Tests disabled HTTP Strict Transport Security.
SecKitTestCase::testEnabledFeaturePolicy public function Tests enabled feature-policy.
SecKitTestCase::testEnabledFromOrigin public function Tests enabled From-Origin.
SecKitTestCase::testHSTSAllDirectves public function Tests HTTP Strict Transport Security has all directives.
SecKitTestCase::testJSCSSNoscript public function Tests JS + CSS + Noscript protection.
SecKitTestCase::testOriginAllowsSite public function Tests HTTP Origin allows requests from the site.
SecKitTestCase::testOriginAllowsSpecifiedSource public function Tests HTTP Origin allows requests from the specified source.
SecKitTestCase::testOriginAllowsSpecifiedSourceMultiWhitelist public function Tests HTTP Origin allows requests from the specified source, with multiple values in the whitelist.
SecKitTestCase::testOriginDeny public function Tests HTTP Origin denies request.
SecKitTestCase::testReferrerPolicyIsDisabled public function Tests disabled Referrer-Policy HTTP response header.
SecKitTestCase::testReferrerPolicyIsEnabled public function Tests enabled Referrer-Policy HTTP response header.
SecKitTestCase::testReportOnlyCSP public function Tests Content Security Policy in report-only mode.
SecKitTestCase::testXFrameOptionsIsAllowFrom public function Tests set to ALLOW-FROM X-Frame-Options HTTP response header.
SecKitTestCase::testXFrameOptionsIsDeny public function Tests set to DENY X-Frame-Options HTTP response header.
SecKitTestCase::testXFrameOptionsIsDisabled public function Tests disabled X-Frame-Options HTTP response header.
SecKitTestCase::testXFrameOptionsIsSameOrigin public function Tests set to SAMEORIGIN X-Frame-Options HTTP response header.
SecKitTestCase::testXXSSProtectionIs0 public function Tests set to 0 X-XSS-Protection HTTP response header.
SecKitTestCase::testXXSSProtectionIs1 public function Tests set to 1 X-XSS-Protection HTTP response header.
SecKitTestCase::testXXSSProtectionIs1Block public function Tests set to 1; mode=block X-XSS-Protection HTTP response header.
SecKitTestCase::testXXSSProtectionIsDisabled public function Tests disabled X-XSS-Protection HTTP response header.