summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/scroll-to-text-fragment/iframes.sub.html
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:22:09 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:22:09 +0000
commit43a97878ce14b72f0981164f87f2e35e14151312 (patch)
tree620249daf56c0258faa40cbdcf9cfba06de2a846 /testing/web-platform/tests/scroll-to-text-fragment/iframes.sub.html
parentInitial commit. (diff)
downloadfirefox-43a97878ce14b72f0981164f87f2e35e14151312.tar.xz
firefox-43a97878ce14b72f0981164f87f2e35e14151312.zip
Adding upstream version 110.0.1.upstream/110.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/scroll-to-text-fragment/iframes.sub.html')
-rw-r--r--testing/web-platform/tests/scroll-to-text-fragment/iframes.sub.html112
1 files changed, 112 insertions, 0 deletions
diff --git a/testing/web-platform/tests/scroll-to-text-fragment/iframes.sub.html b/testing/web-platform/tests/scroll-to-text-fragment/iframes.sub.html
new file mode 100644
index 0000000000..6b3e83f633
--- /dev/null
+++ b/testing/web-platform/tests/scroll-to-text-fragment/iframes.sub.html
@@ -0,0 +1,112 @@
+<!doctype html>
+<title>Navigating to text fragment directives in iframes</title>
+<meta charset=utf-8>
+<link rel="help" href="https://wicg.github.io/ScrollToTextFragment/">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script>
+ function getResult(iframe) {
+ return new Promise((resolve) => {
+ window.addEventListener('message', (e) => {
+ resolve(e.data);
+ }, {once: true});
+ iframe.contentWindow.postMessage('getResult', '*');
+ });
+ }
+
+ function reset(iframe) {
+ return new Promise((resolve) => {
+ window.addEventListener('message', (e) => {
+ resolve();
+ }, {once: true});
+ iframe.contentWindow.postMessage('reset', '*');
+ });
+ }
+
+ function runTests() {
+ const attribute_iframe = document.getElementById('srcattrib');
+ const sameorigin_iframe = document.getElementById('sameorigin');
+ const crossorigin_iframe = document.getElementById('crossorigin');
+
+ // Check behavior that occurs when a text fragment is specified directly in
+ // an iframe's src attribute. We expect the text fragment to be blocked.
+ promise_test(t => new Promise(async resolve => {
+ // No reset since we're checking the hash specified in the `src` attribute.
+ const data = await getResult(attribute_iframe);
+ resolve(data);
+ }).then( data => {
+ assert_equals(data.href.indexOf(':~:'), -1, 'Expected fragment directive to be stripped from the URL.');
+ assert_equals(data.scrollPosition, 'top', 'Should not scroll to text fragment');
+ }), 'Text fragment specified in iframe.src');
+
+ // Check behavior when we set a text fragment using script from a
+ // same-origin parent. The text fragment should be allowed because this is
+ // a same-document navigation initiated by an origin that's same-origin
+ // with the current document.
+ promise_test(t => new Promise(async resolve => {
+ await reset(sameorigin_iframe);
+ sameorigin_iframe.contentWindow.location = `${sameorigin_iframe.src}#:~:text=Target`;
+ const data = await getResult(sameorigin_iframe);
+ resolve(data);
+ }).then( data => {
+ assert_equals(data.href.indexOf(':~:'), -1, 'Expected fragment directive to be stripped from the URL.');
+ assert_equals(data.scrollPosition, 'target', 'Should scroll to text fragment');
+ }), 'Navigate same-origin iframe via window.location');
+
+ // Check behavior when we set a text fragment using script from a
+ // cross-origin parent. The text fragment should be blocked because the
+ // initiating origin is not same-origin with the current document.
+ promise_test(t => new Promise(async resolve => {
+ await reset(crossorigin_iframe);
+ crossorigin_iframe.contentWindow.location = `${crossorigin_iframe.src}#:~:text=Target`;
+ const data = await getResult(crossorigin_iframe);
+ resolve(data);
+ }).then( data => {
+ assert_equals(data.href.indexOf(':~:'), -1, 'Expected fragment directive to be stripped from the URL.');
+ assert_equals(data.scrollPosition, 'top', 'Should not to scroll to text fragment.');
+ }), 'Navigate cross-origin iframe via window.location');
+
+ // Check the element-id fallback behavior when the text is not found. We
+ // should fallback to a regular element-id hash navigation.
+ promise_test(t => new Promise(async resolve => {
+ await reset(sameorigin_iframe);
+ sameorigin_iframe.contentWindow.location = `${sameorigin_iframe.src}#elementid:~:text=NonExistentText`;
+ const data = await getResult(sameorigin_iframe);
+ resolve(data);
+ }).then( data => {
+ assert_equals(data.scrollPosition, 'elementid', 'Should scroll to the element-id anchor.');
+ }), 'Non-matching text with element-id fallback');
+
+ // Check the element-id fallback behaviour when used across origins. The
+ // text fragment should be blocked across origins but the element id hash
+ // should not.
+ promise_test(t => new Promise(async resolve => {
+ await reset(crossorigin_iframe);
+ crossorigin_iframe.contentWindow.location = `${crossorigin_iframe.src}#elementid:~:text=Target%20Text`;
+ const data = await getResult(crossorigin_iframe);
+ resolve(data);
+ }).then( data => {
+ assert_equals(data.scrollPosition, 'elementid', 'Should scroll to the element-id anchor.');
+ }), 'Cross-origin with element-id fallback');
+ }
+</script>
+<style>
+ iframe {
+ width: 100px;
+ height: 100px;
+ }
+</style>
+<body onload="runTests()">
+ <div>
+ Same-Origin with text fragment in src attribute:
+ <iframe id="srcattrib" src="iframe-target.html#:~:text=Target"></iframe>
+ </div>
+ <div>
+ Same-Origin:
+ <iframe id="sameorigin" src="iframe-target.html"></iframe>
+ </div>
+ <div>
+ Cross-Origin:
+ <iframe id="crossorigin" src="http://{{hosts[][www]}}:{{ports[http][0]}}/scroll-to-text-fragment/iframe-target.html"></iframe>
+ </div>
+</body>