diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /dom/base/test/test_iframe_referrer_invalid.html | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/base/test/test_iframe_referrer_invalid.html')
-rw-r--r-- | dom/base/test/test_iframe_referrer_invalid.html | 81 |
1 files changed, 81 insertions, 0 deletions
diff --git a/dom/base/test/test_iframe_referrer_invalid.html b/dom/base/test/test_iframe_referrer_invalid.html new file mode 100644 index 000000000..c4bd1d6ac --- /dev/null +++ b/dom/base/test/test_iframe_referrer_invalid.html @@ -0,0 +1,81 @@ +<!DOCTYPE HTML> +<html> +<head> + <meta charset="utf-8"> + <title>Test iframe referrer policy attribute for Bug 1175736</title> + <script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/> + + <!-- + Testing that iframe referrer attribute is honoured correctly + * invalid referrer policies + https://bugzilla.mozilla.org/show_bug.cgi?id=1175736 + --> + + <script type="application/javascript;version=1.7"> + + const SJS = "://example.com/tests/dom/base/test/referrer_testserver.sjs?"; + const PARAMS = ["ATTRIBUTE_POLICY", "NEW_ATTRIBUTE_POLICY", "META_POLICY", "SCHEME_FROM", "SCHEME_TO"]; + + const testCases = [ + {ACTION: ["generate-iframe-policy-test"], + TESTS: [ + // setting invalid refer values -> we expect either full referrer (default) + // or whatever is specified in the meta referrer policy + + // Note that for those test cases which require cross-origin test, we use different + // scheme to result in cross-origin request. + {ATTRIBUTE_POLICY: 'origin-when-cross-origin', + NAME: 'origin-when-cross-origin-with-no-meta', + META_POLICY: '', + DESC: "origin-when-cross-origin (iframe) with no meta", + SCHEME_FROM: 'https', + SCHEME_TO: 'http', + RESULT: 'origin'}, + {ATTRIBUTE_POLICY: 'default', + NAME: 'default-with-no-meta', + META_POLICY: '', + DESC: "default (iframe) with no meta", + RESULT: 'full'}, + {ATTRIBUTE_POLICY: 'something', + NAME: 'something-with-no-meta', + META_POLICY: '', + DESC: "something (iframe) with no meta", + RESULT: 'full'}, + {ATTRIBUTE_POLICY: 'origin-when-cross-origin', + NAME: 'origin-when-cross-origin-with-no-referrer-in-meta', + META_POLICY: 'no-referrer', + DESC: "origin-when-cross-origin (iframe) with no-referrer in meta", + SCHEME_FROM: 'https', + SCHEME_TO: 'http', + RESULT: 'origin'}, + {ATTRIBUTE_POLICY: 'origin-when-cross-origin', + NAME: 'origin-when-cross-origin-with-unsafe-url-in-meta', + META_POLICY: 'unsafe-url', + DESC: "origin-when-cross-origin (iframe) with unsafe-url in meta", + SCHEME_FROM: 'https', + SCHEME_TO: 'http', + RESULT: 'origin'}, + {ATTRIBUTE_POLICY: 'origin-when-cross-origin', + NAME: 'origin-when-cross-origin-with-origin-in-meta', + META_POLICY: 'origin', + DESC: "origin-when-cross-origin (iframe) with origin in meta", + SCHEME_FROM: 'https', + SCHEME_TO: 'http', + RESULT: 'origin'}, + {NAME: 'origin-in-meta', + META_POLICY: 'origin', + DESC: "origin in meta", + RESULT: 'origin'}, + {NAME: 'no-referrer-in-meta', + META_POLICY: 'no-referrer', + DESC: "no-referrer in meta", + RESULT: 'none'}]} + ]; + </script> + <script type="application/javascript;version=1.7" src="/tests/dom/base/test/referrer_helper.js"></script> +</head> +<body onload="tests.next();"> + <iframe id="testframe"></iframe> +</body> +</html> |