File: location-properties-smoke-test.window.js

package info (click to toggle)
firefox 144.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,637,504 kB
  • sloc: cpp: 7,576,692; javascript: 6,430,831; ansic: 3,748,119; python: 1,398,978; xml: 628,810; asm: 438,679; java: 186,194; sh: 63,212; makefile: 19,159; objc: 13,086; perl: 12,986; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 53; csh: 10
file content (51 lines) | stat: -rw-r--r-- 1,856 bytes parent folder | download | duplicates (14)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
// META: variant=?assign
// META: variant=?customproperty
// META: variant=?hash
// META: variant=?host
// META: variant=?hostname
// META: variant=?pathname
// META: variant=?port
// META: variant=?protocol
// META: variant=?reload
// META: variant=?search
// META: variant=?toString
// META: variant=?valueOf
// META: script=/common/get-host-info.sub.js
// META: script=/common/utils.js
// META: script=/common/dispatcher/dispatcher.js

const property = window.location.search.substr(1);

promise_test(async t => {
  const iframeContext = new RemoteContext(token());
  const iframe = document.createElement("iframe");
  iframe.src = get_host_info().REMOTE_ORIGIN +
    "/common/dispatcher/remote-executor.html?uuid=" + iframeContext.context_id;
  document.body.appendChild(iframe);

  // Wait for the cross-origin document to be loaded inside the iframe.
  assert_equals(
    await iframeContext.execute_script(() => "Document loaded") ,
    "Document loaded"
  );

  assert_throws_dom("SecurityError", () => {
    const unused = iframe.contentWindow.location[property];
  }, "Cross origin get of a location property should throw a security error");

  assert_throws_dom("SecurityError", () => {
    iframe.contentWindow.location[property] = "Random string";
  }, "Cross origin set of a location property should throw a security error");

  // Verify that the property was indeed not modified.
  assert_not_equals(
    await iframeContext.execute_script(property => location[property],
                                       [property]),
    "Random string",
  );

  assert_throws_dom("SecurityError", () => {
    const unused = Object.getOwnPropertyDescriptor(
      iframe.contentWindow.location, property);
  }, "Cross origin get of descriptors should throw a security error");
}, `Verifying that cross-origin access of '${property}' is restricted`);