diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /dom/html/test/test_bug845057.html | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/html/test/test_bug845057.html')
-rw-r--r-- | dom/html/test/test_bug845057.html | 59 |
1 files changed, 59 insertions, 0 deletions
diff --git a/dom/html/test/test_bug845057.html b/dom/html/test/test_bug845057.html new file mode 100644 index 000000000..631cd2b5c --- /dev/null +++ b/dom/html/test/test_bug845057.html @@ -0,0 +1,59 @@ +<!DOCTYPE HTML> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=845057 +--> +<head> + <title>Test for Bug 845057</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=845057">Mozilla Bug 845057</a> +<p id="display"></p> +<div id="content"> + <iframe id="iframe" sandbox="allow-scripts"></iframe> + +</div> +<pre id="test"> +<script class="testbody" type="text/javascript"> + var iframe = document.getElementById("iframe"), + attr = iframe.sandbox; + // Security enforcement tests for iframe sandbox are in test_iframe_* + + function eq(a, b) { + // check if two attributes are qual modulo permutation + return ((a+'').split(" ").sort()+'') == ((b+'').split(" ").sort()+''); + } + + ok(attr instanceof DOMTokenList, + "Iframe sandbox attribute is instace of DOMTokenList"); + ok(eq(attr, "allow-scripts") && + eq(iframe.getAttribute("sandbox"), "allow-scripts"), + "Stringyfied sandbox attribute is same as that of the DOM element"); + + ok(attr.contains("allow-scripts") && !attr.contains("allow-same-origin"), + "Set membership of attribute elements is ok"); + + attr.add("allow-same-origin"); + + ok(attr.contains("allow-scripts") && attr.contains("allow-same-origin"), + "Attribute contains added atom"); + ok(eq(attr, "allow-scripts allow-same-origin") && + eq(iframe.getAttribute("sandbox"), "allow-scripts allow-same-origin"), + "Stringyfied attribute with new atom is correct"); + + attr.add("allow-forms"); + attr.remove("allow-scripts"); + + ok(!attr.contains("allow-scripts") && attr.contains("allow-forms") && + attr.contains("allow-same-origin"), + "Attribute does not contain removed atom"); + ok(eq(attr, "allow-forms allow-same-origin") && + eq(iframe.getAttribute("sandbox"), "allow-forms allow-same-origin"), + "Stringyfied attribute with removed atom is correct"); +</script> +</pre> +</body> +</html> + |