summaryrefslogtreecommitdiffstats
path: root/dom/tests/mochitest/general/test_storagePermissionsLimitForeign.html
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /dom/tests/mochitest/general/test_storagePermissionsLimitForeign.html
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/tests/mochitest/general/test_storagePermissionsLimitForeign.html')
-rw-r--r--dom/tests/mochitest/general/test_storagePermissionsLimitForeign.html44
1 files changed, 44 insertions, 0 deletions
diff --git a/dom/tests/mochitest/general/test_storagePermissionsLimitForeign.html b/dom/tests/mochitest/general/test_storagePermissionsLimitForeign.html
new file mode 100644
index 000000000..36a752316
--- /dev/null
+++ b/dom/tests/mochitest/general/test_storagePermissionsLimitForeign.html
@@ -0,0 +1,44 @@
+<html xmlns="http://www.w3.org/1999/xhtml">
+ <head>
+ <title>Storage Permission Restrictions</title>
+
+ <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
+ <script type="text/javascript" src="storagePermissionsUtils.js"></script>
+ <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
+ </head>
+ <body>
+ <iframe></iframe>
+
+ <script type="text/javascript">
+
+task(function* () {
+ yield setCookieBehavior(BEHAVIOR_LIMIT_FOREIGN);
+
+ // We should be able to access storage
+ yield storageAllowed();
+
+ // Same origin iframes should be allowed.
+ yield runIFrame("frameStorageAllowed.html");
+ yield runIFrame("frameStorageChrome.html?allowed=yes");
+
+ // Null principal iframes should not.
+ yield runIFrame("frameStorageNullprincipal.sjs");
+
+ // Sandboxed iframes should have the null principal, and thus can't access storage
+ document.querySelector('iframe').setAttribute('sandbox', 'allow-scripts');
+ yield runIFrame("frameStoragePrevented.html#nullprincipal");
+ yield runIFrame("frameStorageNullprincipal.sjs");
+ document.querySelector('iframe').removeAttribute('sandbox');
+
+ // Thirdparty iframes should be blocked, even when accessed from chrome over Xrays.
+ yield runIFrame(thirdparty + "frameStoragePrevented.html#thirdparty");
+ yield runIFrame(thirdparty + "frameStorageNullprincipal.sjs");
+ yield runIFrame(thirdparty + "frameStorageChrome.html?allowed=no");
+
+ // Workers should be unable to access storage
+ yield runWorker("workerStorageAllowed.js");
+});
+
+ </script>
+ </body>
+</html>