summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/fenced-frame/csp-allowed.https.html
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/csp-allowed.https.html')
-rw-r--r--testing/web-platform/tests/fenced-frame/csp-allowed.https.html44
1 files changed, 26 insertions, 18 deletions
diff --git a/testing/web-platform/tests/fenced-frame/csp-allowed.https.html b/testing/web-platform/tests/fenced-frame/csp-allowed.https.html
index 8c002bc8a9..4b2fadd59e 100644
--- a/testing/web-platform/tests/fenced-frame/csp-allowed.https.html
+++ b/testing/web-platform/tests/fenced-frame/csp-allowed.https.html
@@ -4,24 +4,31 @@
<script src="/resources/testharnessreport.js"></script>
<script src="/common/utils.js"></script>
<script src="resources/utils.js"></script>
+<script src="/common/dispatcher/dispatcher.js"></script>
<body>
<script>
-for (const resolve_to_config of [true, false]) {
- const allowedCSPs = ["*", "https:", "https://*:*"];
- allowedCSPs.forEach((csp) => {
+const allowedCSPs = [
+ "*",
+ "https:",
+ "https://*:*"
+];
+allowedCSPs.forEach((csp) => {
+ for (const resolve_to_config of [true, false]) {
promise_test(async() => {
- setupCSP(csp);
-
+ const iframe = setupCSP(csp);
const key = token();
- window.addEventListener('securitypolicyviolation', function(e) {
- // Write to the server even though the listener is in the same file in
- // the test below.
- writeValueToServer(key, e.violatedDirective + ";" + e.blockedURI);
- }, {once: true});
- attachFencedFrame(await runSelectURL("resources/embeddee.html",
- [key], resolve_to_config));
+ await iframe.execute(async (key, resolve_to_config) => {
+ window.addEventListener('securitypolicyviolation', function(e) {
+ // Write to the server even though the listener is in the same file in
+ // the test below.
+ writeValueToServer(key, e.violatedDirective + ";" + e.blockedURI);
+ }, {once: true});
+
+ attachFencedFrame(await runSelectURL(
+ "/fenced-frame/resources/embeddee.html", [key], resolve_to_config));
+ }, [key, resolve_to_config]);
const result = await nextValueFromServer(key);
assert_equals(result, "PASS",
@@ -29,12 +36,13 @@ for (const resolve_to_config of [true, false]) {
}, "Fenced frame loaded for CSP fenced-frame-src " + csp + " using " +
(resolve_to_config ? "config" : "urn:uuid"));
- promise_test(async() => {
- setupCSP(csp);
+ }
+ promise_test(async() => {
+ const iframe = setupCSP(csp);
+ await iframe.execute(() => {
assert_true(navigator.canLoadAdAuctionFencedFrame());
- }, "Opaque-ads can load API returns true for " + csp + " using " +
- (resolve_to_config ? "config" : "urn:uuid"));
- });
-}
+ });
+ }, "Opaque-ads can load API returns true for " + csp);
+});
</script>
</body>