diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-15 03:35:49 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-15 03:35:49 +0000 |
commit | d8bbc7858622b6d9c278469aab701ca0b609cddf (patch) | |
tree | eff41dc61d9f714852212739e6b3738b82a2af87 /testing/web-platform/tests/fenced-frame/csp-blocked-transparent.https.html | |
parent | Releasing progress-linux version 125.0.3-1~progress7.99u1. (diff) | |
download | firefox-d8bbc7858622b6d9c278469aab701ca0b609cddf.tar.xz firefox-d8bbc7858622b6d9c278469aab701ca0b609cddf.zip |
Merging upstream version 126.0.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/csp-blocked-transparent.https.html')
-rw-r--r-- | testing/web-platform/tests/fenced-frame/csp-blocked-transparent.https.html | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/testing/web-platform/tests/fenced-frame/csp-blocked-transparent.https.html b/testing/web-platform/tests/fenced-frame/csp-blocked-transparent.https.html new file mode 100644 index 0000000000..16a3d94fce --- /dev/null +++ b/testing/web-platform/tests/fenced-frame/csp-blocked-transparent.https.html @@ -0,0 +1,41 @@ +<!DOCTYPE html> +<title>Test transparent fenced frame navigations with blocked CSP</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/utils.js"></script> +<script src="resources/utils.js"></script> +<script src="/common/get-host-info.sub.js"></script> +<script src="/common/dispatcher/dispatcher.js"></script> + +<body> +<script> +const blockedCSPs = [ + "none", + "https://localhost:80", + "https://*:80", + "https://localhost:*" +]; +blockedCSPs.forEach((csp) => { + promise_test(async() => { + const iframe = setupCSP(csp); + const key = token(); + const url = generateURL("/fenced-frame/resources/embeddee.html", [key]); + + await iframe.execute(async (key, url, csp) => { + let promise = new Promise((resolve) => { + window.addEventListener('securitypolicyviolation', function(e) { + resolve(e.violatedDirective + ";" + e.blockedURI); + }, {once: true}); + }); + + attachFencedFrame(url); + + await promise.then((result) => { + assert_equals(result, "fenced-frame-src;" + url, + "The fenced frame should not load for CSP fenced-frame-src " + csp); + }); + }, [key, url, csp]); + }, "Fenced frame loaded for CSP fenced-frame-src " + csp); +}); +</script> +</body> |