diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-15 03:35:49 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-15 03:35:49 +0000 |
commit | d8bbc7858622b6d9c278469aab701ca0b609cddf (patch) | |
tree | eff41dc61d9f714852212739e6b3738b82a2af87 /testing/web-platform/tests/fenced-frame/csp-allowed.https.html | |
parent | Releasing progress-linux version 125.0.3-1~progress7.99u1. (diff) | |
download | firefox-d8bbc7858622b6d9c278469aab701ca0b609cddf.tar.xz firefox-d8bbc7858622b6d9c278469aab701ca0b609cddf.zip |
Merging upstream version 126.0.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/csp-allowed.https.html')
-rw-r--r-- | testing/web-platform/tests/fenced-frame/csp-allowed.https.html | 44 |
1 files changed, 26 insertions, 18 deletions
diff --git a/testing/web-platform/tests/fenced-frame/csp-allowed.https.html b/testing/web-platform/tests/fenced-frame/csp-allowed.https.html index 8c002bc8a9..4b2fadd59e 100644 --- a/testing/web-platform/tests/fenced-frame/csp-allowed.https.html +++ b/testing/web-platform/tests/fenced-frame/csp-allowed.https.html @@ -4,24 +4,31 @@ <script src="/resources/testharnessreport.js"></script> <script src="/common/utils.js"></script> <script src="resources/utils.js"></script> +<script src="/common/dispatcher/dispatcher.js"></script> <body> <script> -for (const resolve_to_config of [true, false]) { - const allowedCSPs = ["*", "https:", "https://*:*"]; - allowedCSPs.forEach((csp) => { +const allowedCSPs = [ + "*", + "https:", + "https://*:*" +]; +allowedCSPs.forEach((csp) => { + for (const resolve_to_config of [true, false]) { promise_test(async() => { - setupCSP(csp); - + const iframe = setupCSP(csp); const key = token(); - window.addEventListener('securitypolicyviolation', function(e) { - // Write to the server even though the listener is in the same file in - // the test below. - writeValueToServer(key, e.violatedDirective + ";" + e.blockedURI); - }, {once: true}); - attachFencedFrame(await runSelectURL("resources/embeddee.html", - [key], resolve_to_config)); + await iframe.execute(async (key, resolve_to_config) => { + window.addEventListener('securitypolicyviolation', function(e) { + // Write to the server even though the listener is in the same file in + // the test below. + writeValueToServer(key, e.violatedDirective + ";" + e.blockedURI); + }, {once: true}); + + attachFencedFrame(await runSelectURL( + "/fenced-frame/resources/embeddee.html", [key], resolve_to_config)); + }, [key, resolve_to_config]); const result = await nextValueFromServer(key); assert_equals(result, "PASS", @@ -29,12 +36,13 @@ for (const resolve_to_config of [true, false]) { }, "Fenced frame loaded for CSP fenced-frame-src " + csp + " using " + (resolve_to_config ? "config" : "urn:uuid")); - promise_test(async() => { - setupCSP(csp); + } + promise_test(async() => { + const iframe = setupCSP(csp); + await iframe.execute(() => { assert_true(navigator.canLoadAdAuctionFencedFrame()); - }, "Opaque-ads can load API returns true for " + csp + " using " + - (resolve_to_config ? "config" : "urn:uuid")); - }); -} + }); + }, "Opaque-ads can load API returns true for " + csp); +}); </script> </body> |