summaryrefslogtreecommitdiffstats
path: root/dom/tests/mochitest/general/test_storagePermissionsLimitForeign.html
blob: e2b4b93798e18f2c1dff25886c3786fc7a08cdd9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
<html xmlns="http://www.w3.org/1999/xhtml">
  <head>
    <title>Storage Permission Restrictions</title>

    <script src="/tests/SimpleTest/SimpleTest.js"></script>
    <script type="text/javascript" src="storagePermissionsUtils.js"></script>
    <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
  </head>
  <body>
    <iframe></iframe>

    <script type="text/javascript">

task(async function() {
  await setCookieBehavior(BEHAVIOR_LIMIT_FOREIGN);

  await runTestInWindow(async function() {
    // We should be able to access storage
    await storageAllowed();

    // Same origin iframes should be allowed.
    await runIFrame("frameStorageAllowed.html");
    await runIFrame("frameStorageChrome.html?allowed=yes");

    // Null principal iframes should not.
    await runIFrame("frameStorageNullprincipal.sjs");

    // Sandboxed iframes should have the null principal, and thus can't access storage
    document.querySelector('iframe').setAttribute('sandbox', 'allow-scripts');
    await runIFrame("frameStoragePrevented.html#nullprincipal");
    await runIFrame("frameStorageNullprincipal.sjs");
    document.querySelector('iframe').removeAttribute('sandbox');

    // Thirdparty iframes should be blocked, even when accessed from chrome over Xrays.
    await runIFrame(thirdparty + "frameStoragePrevented.html#thirdparty");
    await runIFrame(thirdparty + "frameStorageNullprincipal.sjs");
    await runIFrame(thirdparty + "frameStorageChrome.html?allowed=no");

    // Workers should be unable to access storage
    await runWorker("workerStorageAllowed.js");
  });
});

    </script>
  </body>
</html>