diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-15 03:35:49 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-15 03:35:49 +0000 |
commit | d8bbc7858622b6d9c278469aab701ca0b609cddf (patch) | |
tree | eff41dc61d9f714852212739e6b3738b82a2af87 /testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html | |
parent | Releasing progress-linux version 125.0.3-1~progress7.99u1. (diff) | |
download | firefox-d8bbc7858622b6d9c278469aab701ca0b609cddf.tar.xz firefox-d8bbc7858622b6d9c278469aab701ca0b609cddf.zip |
Merging upstream version 126.0.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html')
-rw-r--r-- | testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html | 53 |
1 files changed, 0 insertions, 53 deletions
diff --git a/testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html b/testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html deleted file mode 100644 index c1c815d49e..0000000000 --- a/testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html +++ /dev/null @@ -1,53 +0,0 @@ -<!DOCTYPE html> -<title>Test transparent url navigated in fenced frame interacting with CSP</title> -<script src="/resources/testharness.js"></script> -<script src="/resources/testharnessreport.js"></script> -<script src="/common/utils.js"></script> -<script src="/common/dispatcher/dispatcher.js"></script> -<script src="resources/utils.js"></script> - -<body> -<script> -function setupCSP(csp) { - let meta = document.createElement('meta'); - meta.httpEquiv = "Content-Security-Policy"; - meta.content = "fenced-frame-src " + csp; - document.head.appendChild(meta); -} - -const allowedCSPs = ["*", "https:", "'self'"]; -allowedCSPs.forEach((csp) => { - promise_test(async(t) => { - setupCSP(csp); - - t.step_timeout(t.unreached_func( - "The fenced frame should load for CSP fenced-frame-src " + csp), 3000); - - const fencedframe = attachFencedFrameContext(); - await fencedframe.execute(() => {}); - }, "Fenced frame loaded for CSP fenced-frame-src " + csp); -}); - -const blockedCSPs = ["'none'"]; -blockedCSPs.forEach((csp) => { - promise_test(async(t) => { - setupCSP(csp); - - const csp_violation = new Promise(resolve => { - window.addEventListener("securitypolicyviolation", resolve); - }); - - const fencedframe = attachFencedFrameContext(); - - const fencedframe_loaded = fencedframe.execute(() => {}); - fencedframe_loaded.then(t.unreached_func( - "The fenced frame should not load for CSP fenced-frame-src " + csp)); - - const csp_violation_event = await csp_violation; - const remote_url = getRemoteContextURL(location.origin).toString(); - assert_true(csp_violation_event.blockedURI.includes(remote_url), - "blockedURI should include the url"); - }, "Fenced frame blocked for CSP fenced-frame-src " + csp); -}); -</script> -</body> |