diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /testing/web-platform/tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'testing/web-platform/tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html')
-rw-r--r-- | testing/web-platform/tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html | 74 |
1 files changed, 74 insertions, 0 deletions
diff --git a/testing/web-platform/tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html b/testing/web-platform/tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html new file mode 100644 index 000000000..f1d5581f6 --- /dev/null +++ b/testing/web-platform/tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html @@ -0,0 +1,74 @@ +<!DOCTYPE html> +<meta charset="utf-8"/> +<title>HTML Test: window.frameElement</title> +<link rel="author" title="Intel" href="http://www.intel.com/" /> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/get-host-info.sub.js"></script> +<script> + +var t1 = async_test("The window's frameElement attribute must return its container element if it is a nested browsing context"); +var t2 = async_test("The SecurityError must be thrown if the window accesses to frameElement attribute of a Window which does not have the same effective script origin"); +var t3 = async_test("The window's frameElement attribute must return null if the container's document does not have the same effective script origin"); + +function on_load() { + t1.step(function () { + assert_equals(frames[0].frameElement, document.getElementById("fr1"), + "The frameElement attribute should be the first iframe element."); + assert_equals(window["win2"].frameElement, document.getElementById("obj"), + "The frameElement attribute should be the object element."); + assert_equals(window["win3"].frameElement, document.getElementById("emb"), + "The frameElement attribute should be the embed element."); + assert_equals(document.getElementById("fr4").contentWindow[0].frameElement, + document.getElementById("fr4").contentDocument.getElementById("f1"), + "The frameElement attribute should be the frame element in 'test.html'."); + }); + t1.done(); + + t2.step(function () { + assert_throws("SecurityError", function () { frames[1].frameElement; }, + "The SecurityError exception should be thrown."); + }); + t2.done(); + + t3.step(function () { + document.getElementById("fr5").contentWindow.postMessage(null, "*"); + }); + window.addEventListener("message", function (event) { + var data = JSON.parse(event.data); + if (data.name == "testcase3") { + t3.step(function () { + assert_equals(data.result, "window.frameElement = null", + "The frameElement attribute should be null."); + }); + t3.done(); + } + }, false); +} + +</script> +<body onload="on_load()"> + <div id="log"></div> + <iframe id="fr1"></iframe> + <iframe id="fr2" src="test.html"></iframe> <!-- cross origin --> + <iframe id="fr3" src="" style="display:none"></iframe> + <object id="obj" name="win2" type="text/html" data="about:blank"></object> + <embed id="emb" name="win3" type="image/svg+xml" src="/images/green.svg" /> + <iframe id="fr4" src="test.html"></iframe> <!-- same origin --> + <iframe id="fr5" src="testcase3.html"></iframe> <!-- cross origin --> + <script> + + setup(function () { + var src_base = get_host_info().HTTP_REMOTE_ORIGIN; + src_base += document.location.pathname.substring(0, document.location.pathname.lastIndexOf("/") + 1); + document.getElementById("fr2").src = src_base + "test.html"; + document.getElementById("fr5").src = src_base + "testcase3.html"; + }); + + test(function () { + assert_equals(window.frameElement, null, + "The frameElement attribute should be null."); + }, "The window's frameElement attribute must return null if it is not a nested browsing context"); + + </script> +</body> |