File: require-corp-embed-anonymous-iframe.tentative.https.window.js

package info (click to toggle)
firefox 145.0.1-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,653,528 kB
  • sloc: cpp: 7,594,999; javascript: 6,459,658; ansic: 3,752,909; python: 1,403,455; xml: 629,809; asm: 438,679; java: 186,421; sh: 67,287; makefile: 19,169; objc: 13,086; perl: 12,982; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (49 lines) | stat: -rw-r--r-- 1,824 bytes parent folder | download | duplicates (18)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
// META: script=/common/utils.js

promise_test(async t => {
  let iframe_allowed = (iframe) => new Promise(async resolve => {
    window.addEventListener("message", t.step_func(msg => {
      if (msg.source !== iframe.contentWindow) return;
      assert_equals(msg.data, "loaded",
                    "Unexpected message from broadcast channel.");
      resolve(true);
    }));

    // To see whether the iframe was blocked, we check whether it
    // becomes cross-origin (since error pages are loaded cross-origin).
    await t.step_wait(() => {
      try {
        // Accessing contentWindow.location.href cross-origin throws.
        iframe.contentWindow.location.href === null;
        return false;
      } catch {
        return true;
      }
    });
    resolve(false);
  });

  // Create a credentialless child iframe.
  const child = document.createElement("iframe");
  child.credentialless = true;
  t.add_cleanup(() => child.remove());

  child.src = "/html/cross-origin-embedder-policy/resources/" +
    "navigate-none.sub.html?postMessageTo=top";
  document.body.append(child);

  assert_true(await iframe_allowed(child),
              "The credentialless iframe should be allowed.");

  // Create a child of the credentialless iframe. Even if the grandchild
  // does not have the 'credentialless' attribute set, it inherits the
  // credentialless property from the parent.
  const grandchild = child.contentDocument.createElement("iframe");

  grandchild.src = "/html/cross-origin-embedder-policy/resources/" +
    "navigate-none.sub.html?postMessageTo=top";
  child.contentDocument.body.append(grandchild);

  assert_true(await iframe_allowed(grandchild),
             "The child of the credentialless iframe should be allowed.");
}, 'Loading a credentialless iframe with COEP: require-corp is allowed.');