summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/content-security-policy/meta/sandbox-iframe.html
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:22:09 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:22:09 +0000
commit43a97878ce14b72f0981164f87f2e35e14151312 (patch)
tree620249daf56c0258faa40cbdcf9cfba06de2a846 /testing/web-platform/tests/content-security-policy/meta/sandbox-iframe.html
parentInitial commit. (diff)
downloadfirefox-43a97878ce14b72f0981164f87f2e35e14151312.tar.xz
firefox-43a97878ce14b72f0981164f87f2e35e14151312.zip
Adding upstream version 110.0.1.upstream/110.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/content-security-policy/meta/sandbox-iframe.html')
-rw-r--r--testing/web-platform/tests/content-security-policy/meta/sandbox-iframe.html54
1 files changed, 54 insertions, 0 deletions
diff --git a/testing/web-platform/tests/content-security-policy/meta/sandbox-iframe.html b/testing/web-platform/tests/content-security-policy/meta/sandbox-iframe.html
new file mode 100644
index 0000000000..d353cafae1
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/meta/sandbox-iframe.html
@@ -0,0 +1,54 @@
+<!DOCTYPE HTML>
+<html>
+
+<head>
+ <meta http-equiv="Content-Security-Policy" content="base-uri {{location[scheme]}}://{{domains[]}}:{{ports[http][0]}}/base/">
+
+ <title>base-uri works correctly inside a sandboxed iframe.</title>
+ <script src='/resources/testharness.js'></script>
+ <script src='/resources/testharnessreport.js'></script>
+</head>
+
+<body>
+ <h1>self is derived correctly inside inside a sandboxed iframe.</h1>
+ <div id='log'></div>
+
+ <script>
+ window.addEventListener('securitypolicyviolation', function(e) {
+ assert_unreached('No CSP violation report should have been fired.');
+ });
+
+ async_test(function(t) {
+ var i = document.createElement('iframe');
+ i.sandbox = 'allow-scripts';
+ i.style.display = 'none';
+ i.srcdoc = `
+ <meta http-equiv="Content-Security-Policy" content="img-src 'self'">
+ <body>
+ <script>
+
+ var img = document.createElement('img');
+ img.src = '../support/fail.png';
+ img.onerror = function() {
+ top.postMessage('FAIL', '*');
+ };
+ img.onload = function() {
+ top.postMessage('PASS', '*');
+ };
+ document.body.appendChild(img);
+ </sc` + `ript></body>`;
+
+ window.addEventListener('message', t.step_func(function(e) {
+ if (e.source === i.contentWindow) {
+ assert_equals(e.data, 'PASS');
+ t.done();
+ }
+ }));
+
+ document.body.appendChild(i);
+ }, 'img-src \'self\' works when specified in a meta tag.');
+ </script>
+
+</body>
+
+</html>