diff options
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/csp-allowed-transparent.https.html')
-rw-r--r-- | testing/web-platform/tests/fenced-frame/csp-allowed-transparent.https.html | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/testing/web-platform/tests/fenced-frame/csp-allowed-transparent.https.html b/testing/web-platform/tests/fenced-frame/csp-allowed-transparent.https.html new file mode 100644 index 0000000000..66259b3a1c --- /dev/null +++ b/testing/web-platform/tests/fenced-frame/csp-allowed-transparent.https.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<title>Test transparent fenced frame navigations with allowed CSP</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/utils.js"></script> +<script src="resources/utils.js"></script> +<script src="/common/get-host-info.sub.js"></script> +<script src="/common/dispatcher/dispatcher.js"></script> + +<body> +<script> +const allowedCSPs = [ + "*", + "https://*:*", + get_host_info().HTTPS_ORIGIN, + 'https://' + get_host_info().ORIGINAL_HOST + ":*" +]; +allowedCSPs.forEach((csp) => { + promise_test(async() => { + const iframe = setupCSP(csp); + const key = token(); + + await iframe.execute(async (key) => { + window.addEventListener('securitypolicyviolation', function(e) { + // Write to the server even though the listener is in the same file in + // the test below. + writeValueToServer(key, e.violatedDirective + ";" + e.blockedURI); + }, {once: true}); + + const url = generateURL("/fenced-frame/resources/embeddee.html", [key]); + attachFencedFrame(url); + }, [key]); + + const result = await nextValueFromServer(key); + assert_equals(result, "PASS", + "The fenced frame should load for CSP fenced-frame-src " + csp); + }, "Fenced frame loaded for CSP fenced-frame-src " + csp); +}); +</script> +</body> |