blob: d353cafae1618d63482bda072f4ca530efa54a0b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
|
<!DOCTYPE HTML>
<html>
<head>
<meta http-equiv="Content-Security-Policy" content="base-uri {{location[scheme]}}://{{domains[]}}:{{ports[http][0]}}/base/">
<title>base-uri works correctly inside a sandboxed iframe.</title>
<script src='/resources/testharness.js'></script>
<script src='/resources/testharnessreport.js'></script>
</head>
<body>
<h1>self is derived correctly inside inside a sandboxed iframe.</h1>
<div id='log'></div>
<script>
window.addEventListener('securitypolicyviolation', function(e) {
assert_unreached('No CSP violation report should have been fired.');
});
async_test(function(t) {
var i = document.createElement('iframe');
i.sandbox = 'allow-scripts';
i.style.display = 'none';
i.srcdoc = `
<meta http-equiv="Content-Security-Policy" content="img-src 'self'">
<body>
<script>
var img = document.createElement('img');
img.src = '../support/fail.png';
img.onerror = function() {
top.postMessage('FAIL', '*');
};
img.onload = function() {
top.postMessage('PASS', '*');
};
document.body.appendChild(img);
</sc` + `ript></body>`;
window.addEventListener('message', t.step_func(function(e) {
if (e.source === i.contentWindow) {
assert_equals(e.data, 'PASS');
t.done();
}
}));
document.body.appendChild(i);
}, 'img-src \'self\' works when specified in a meta tag.');
</script>
</body>
</html>
|