dom/browser-element/mochitest/browserElement_XFrameOptions.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 /* Any copyright is dedicated to the public domain.
     2    http://creativecommons.org/publicdomain/zero/1.0/ */
     4 // Bug 770239 - Test that we can load pages with X-Frame-Options: Deny inside
     5 // <iframe mozbrowser>.
     6 "use strict";
     8 SimpleTest.waitForExplicitFinish();
     9 browserElementTestHelpers.setEnabledPref(true);
    10 browserElementTestHelpers.addPermission();
    12 function runTest() {
    13   var iframe = document.createElement('iframe');
    14   SpecialPowers.wrap(iframe).mozbrowser = true;
    16   // The page we load will fire an alert when it successfully loads.
    17   iframe.addEventListener('mozbrowsershowmodalprompt', function(e) {
    18     ok(true, "Got alert");
    19     SimpleTest.finish();
    20   });
    22   document.body.appendChild(iframe);
    23   iframe.src = 'file_browserElement_XFrameOptions.sjs?DENY';
    24 }
    26 addEventListener('testready', runTest);

mercurial