blob: 36a7523164aa4f88839db07a2e7e7a7bb7aedc06 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
|
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Storage Permission Restrictions</title>
<script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
<script type="text/javascript" src="storagePermissionsUtils.js"></script>
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
</head>
<body>
<iframe></iframe>
<script type="text/javascript">
task(function* () {
yield setCookieBehavior(BEHAVIOR_LIMIT_FOREIGN);
// We should be able to access storage
yield storageAllowed();
// Same origin iframes should be allowed.
yield runIFrame("frameStorageAllowed.html");
yield runIFrame("frameStorageChrome.html?allowed=yes");
// Null principal iframes should not.
yield runIFrame("frameStorageNullprincipal.sjs");
// Sandboxed iframes should have the null principal, and thus can't access storage
document.querySelector('iframe').setAttribute('sandbox', 'allow-scripts');
yield runIFrame("frameStoragePrevented.html#nullprincipal");
yield runIFrame("frameStorageNullprincipal.sjs");
document.querySelector('iframe').removeAttribute('sandbox');
// Thirdparty iframes should be blocked, even when accessed from chrome over Xrays.
yield runIFrame(thirdparty + "frameStoragePrevented.html#thirdparty");
yield runIFrame(thirdparty + "frameStorageNullprincipal.sjs");
yield runIFrame(thirdparty + "frameStorageChrome.html?allowed=no");
// Workers should be unable to access storage
yield runWorker("workerStorageAllowed.js");
});
</script>
</body>
</html>
|