summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/fenced-frame/resources/config-embed-cross-origin-iframe.https.html
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/resources/config-embed-cross-origin-iframe.https.html')
-rw-r--r--testing/web-platform/tests/fenced-frame/resources/config-embed-cross-origin-iframe.https.html18
1 files changed, 18 insertions, 0 deletions
diff --git a/testing/web-platform/tests/fenced-frame/resources/config-embed-cross-origin-iframe.https.html b/testing/web-platform/tests/fenced-frame/resources/config-embed-cross-origin-iframe.https.html
new file mode 100644
index 0000000000..f21afee011
--- /dev/null
+++ b/testing/web-platform/tests/fenced-frame/resources/config-embed-cross-origin-iframe.https.html
@@ -0,0 +1,18 @@
+<!DOCTYPE html>
+<script src="utils.js"></script>
+<script src="/common/get-host-info.sub.js"></script>
+<title>Fenced frame attribution reporting self navigation test</title>
+
+<body>
+<script>
+// This helper function will navigate a child iframe to a remote origin page.
+// It will then check to make sure that window.fence APIs are not allowed after
+// the navigation. This code is meant to run in a fenced frame.
+const [key] = parseKeylist();
+
+const configs = window.fence.getNestedConfigs();
+const next_url = getRemoteOriginURL(generateURL(
+ "config-cross-origin-iframe.https.html", [key]));
+attachIFrame(next_url);
+</script>
+</body>