1
0
Fork 0
firefox/testing/web-platform/tests/fenced-frame/csp-fenced-frame-src-blocked.https.html
Daniel Baumann 5e9a113729
Adding upstream version 140.0.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
2025-06-25 09:37:52 +02:00

37 lines
1.3 KiB
HTML

<!DOCTYPE html>
<meta http-equiv="Content-Security-Policy" content="fenced-frame-src 'none'">
<title>Test Content-Security-Policy fenced-frame-src</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="resources/utils.js"></script>
<script src="/common/utils.js"></script>
<body>
<script>
const key = token();
window.addEventListener('securitypolicyviolation', function(e) {
// Write to the server even though the listener is in the same file in the
// test below.
writeValueToServer(key, e.violatedDirective + ";" + e.blockedURI);
});
promise_test(async () => {
attachFencedFrame(generateURL(
"resources/csp-fenced-frame-src-blocked-inner.html",
[key]));
const result = await nextValueFromServer(key);
const expected_blocked_uri = generateURL(
"resources/csp-fenced-frame-src-blocked-inner.html",
[key]).toString();
assert_equals(result, "fenced-frame-src;" + expected_blocked_uri,
"The fenced frame is blocked because of CSP violation");
}, "csp-fenced-frame-src-blocked");
promise_test(async () => {
assert_false(navigator.canLoadAdAuctionFencedFrame());
}, "fenced-frame-src none is taken into account with " +
"navigator.canLoadAdAuctionFencedFrame");
</script>
</body>