зеркало из https://github.com/mozilla/gecko-dev.git
43 строки
1.5 KiB
HTML
43 строки
1.5 KiB
HTML
<html xmlns="http://www.w3.org/1999/xhtml">
|
|
<head>
|
|
<title>Storage Permission Restrictions</title>
|
|
|
|
<script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
|
|
<script type="text/javascript" src="storagePermissionsUtils.js"></script>
|
|
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
|
|
</head>
|
|
<body>
|
|
<iframe></iframe>
|
|
|
|
<script type="text/javascript">
|
|
|
|
task(async function() {
|
|
await setCookieBehavior(BEHAVIOR_ACCEPT);
|
|
|
|
// We should be able to access storage
|
|
await storageAllowed();
|
|
|
|
// Same origin iframes should be allowed, unless they redirect to a URI with the null principal
|
|
await runIFrame("frameStorageAllowed.html");
|
|
await runIFrame("frameStorageNullprincipal.sjs");
|
|
await runIFrame("frameStorageChrome.html?allowed=yes");
|
|
|
|
// Sandboxed iframes should have the null principal, and thus can't access storage
|
|
document.querySelector('iframe').setAttribute('sandbox', 'allow-scripts');
|
|
await runIFrame("frameStoragePrevented.html#nullprincipal");
|
|
await runIFrame("frameStorageNullprincipal.sjs");
|
|
document.querySelector('iframe').removeAttribute('sandbox');
|
|
|
|
// Thirdparty iframes should be allowed, unless they redirect to a URI with the null principal
|
|
await runIFrame(thirdparty + "frameStorageAllowed.html");
|
|
await runIFrame(thirdparty + "frameStorageNullprincipal.sjs");
|
|
await runIFrame(thirdparty + "frameStorageChrome.html?allowed=yes");
|
|
|
|
// Workers should be able to access storage
|
|
await runWorker("workerStorageAllowed.js");
|
|
});
|
|
|
|
</script>
|
|
</body>
|
|
</html>
|