mirror of
https://github.com/servo/servo.git
synced 2025-08-06 06:00:15 +01:00
Update web-platform-tests to revision 155daf0c385420faf208b8bd5e319e244ec7f9cc
This commit is contained in:
parent
4e6b100c7e
commit
e9bdf87a27
768 changed files with 5782 additions and 26218 deletions
|
@ -1,66 +1,66 @@
|
|||
<!DOCTYPE html>
|
||||
<meta charset="utf-8"/>
|
||||
<title>HTML Test: window.frameElement</title>
|
||||
<link rel="author" title="Intel" href="http://www.intel.com/" />
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8"/>
|
||||
<title>HTML Test: window.frameElement</title>
|
||||
<link rel="author" title="Intel" href="http://www.intel.com/" />
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<!-- t1 (same-origin)-->
|
||||
<iframe id="iframe_0"></iframe>
|
||||
<iframe id="iframe_1" src="./resources/frameElement-nested-frame.html"></iframe>
|
||||
<object id="object_id" name="object_name" type="text/html" data="about:blank"></object>
|
||||
<embed id="embed_id" name="embed_name" type="image/svg+xml" src="/images/green.svg" />
|
||||
|
||||
var t1 = async_test("The window's frameElement attribute must return its container element if it is a nested browsing context");
|
||||
var t2 = async_test("The SecurityError must be thrown if the window accesses to frameElement attribute of a Window which does not have the same effective script origin");
|
||||
var t3 = async_test("The window's frameElement attribute must return null if the container's document does not have the same effective script origin");
|
||||
<!-- t2 (cross-origin) -->
|
||||
<iframe name="iframe_2" src="http://{{hosts[alt][]}}:{{ports[http][0]}}/html/browsers/windows/nested-browsing-contexts/resources/frameElement-nested-frame.html"></iframe>
|
||||
|
||||
function on_load() {
|
||||
t1.step(function () {
|
||||
assert_equals(frames[0].frameElement, document.getElementById("fr1"),
|
||||
"The frameElement attribute should be the first iframe element.");
|
||||
assert_equals(window["win2"].frameElement, document.getElementById("obj"),
|
||||
"The frameElement attribute should be the object element.");
|
||||
assert_equals(window["win3"].frameElement, document.getElementById("emb"),
|
||||
"The frameElement attribute should be the embed element.");
|
||||
assert_equals(document.getElementById("fr4").contentWindow[0].frameElement,
|
||||
document.getElementById("fr4").contentDocument.getElementById("f1"),
|
||||
"The frameElement attribute should be the frame element in 'resources/frameElement-nested-frame.html'.");
|
||||
});
|
||||
t1.done();
|
||||
<!-- t3 (cross-origin) -->
|
||||
<iframe id="iframe_3" src="http://{{hosts[alt][]}}:{{ports[http][0]}}/html/browsers/windows/nested-browsing-contexts/resources/frameElement-window-post.html"></iframe>
|
||||
|
||||
t2.step(function () {
|
||||
assert_throws("SecurityError", function () { frames[1].frameElement; },
|
||||
"The SecurityError exception should be thrown.");
|
||||
});
|
||||
t2.done();
|
||||
<script>
|
||||
test(function() {
|
||||
assert_equals(window.frameElement, null,
|
||||
"The frameElement attribute should be null.");
|
||||
}, "The window's frameElement attribute must return null if it is not a nested browsing context");
|
||||
|
||||
t3.step(function () {
|
||||
document.getElementById("fr5").contentWindow.postMessage(null, "*");
|
||||
});
|
||||
window.addEventListener("message", function (event) {
|
||||
var data = JSON.parse(event.data);
|
||||
if (data.name == "testcase3") {
|
||||
t3.step(function () {
|
||||
assert_equals(data.result, "window.frameElement = null",
|
||||
"The frameElement attribute should be null.");
|
||||
});
|
||||
t3.done();
|
||||
}
|
||||
}, false);
|
||||
}
|
||||
var t1 = async_test("The window's frameElement attribute must return its container element if it is a nested browsing context");
|
||||
window.addEventListener("load", t1.step_func_done(function() {
|
||||
assert_equals(frames[0].frameElement, document.getElementById("iframe_0"),
|
||||
"The frameElement attribute should be the first iframe element.");
|
||||
assert_equals(window["object_name"].frameElement, document.getElementById("object_id"),
|
||||
"The frameElement attribute should be the object element.");
|
||||
assert_equals(window["embed_name"].frameElement, document.getElementById("embed_id"),
|
||||
"The frameElement attribute should be the embed element.");
|
||||
assert_equals(document.getElementById("iframe_1").contentWindow[0].frameElement,
|
||||
document.getElementById("iframe_1").contentDocument.getElementById("f1"),
|
||||
"The frameElement attribute should be the frame element in 'resources/frameElement-nested-frame.html'.");
|
||||
}));
|
||||
|
||||
</script>
|
||||
<body onload="on_load()">
|
||||
<div id="log"></div>
|
||||
<iframe id="fr1"></iframe>
|
||||
<iframe id="fr2" src="http://{{hosts[alt][]}}:{{ports[http][0]}}/html/browsers/windows/nested-browsing-contexts/resources/frameElement-nested-frame.html"></iframe><!--cross origin -->
|
||||
<iframe id="fr3" src="" style="display:none"></iframe>
|
||||
<object id="obj" name="win2" type="text/html" data="about:blank"></object>
|
||||
<embed id="emb" name="win3" type="image/svg+xml" src="/images/green.svg" />
|
||||
<iframe id="fr4" src="resources/frameElement-nested-frame.html"></iframe> <!-- same origin -->
|
||||
<iframe id="fr5" src="http://{{hosts[alt][]}}:{{ports[http][0]}}/html/browsers/windows/nested-browsing-contexts/resources/frameElement-window-post.html"></iframe> <!-- cross origin -->
|
||||
<script>
|
||||
var t2 = async_test("The SecurityError must be thrown if the window accesses to frameElement attribute of a Window which does not have the same effective script origin");
|
||||
window.addEventListener("load", t2.step_func_done(function() {
|
||||
assert_throws("SecurityError", function() {
|
||||
frames["iframe_2"].frameElement;
|
||||
},
|
||||
"The SecurityError exception should be thrown.");
|
||||
}));
|
||||
|
||||
test(function () {
|
||||
assert_equals(window.frameElement, null,
|
||||
"The frameElement attribute should be null.");
|
||||
}, "The window's frameElement attribute must return null if it is not a nested browsing context");
|
||||
|
||||
</script>
|
||||
</body>
|
||||
var t3 = async_test("The window's frameElement attribute must return null if the container's document does not have the same effective script origin");
|
||||
window.addEventListener("load", function() {
|
||||
window.addEventListener("message", function(event) {
|
||||
var data = JSON.parse(event.data);
|
||||
if (data.name == "testcase3") {
|
||||
t3.step(function() {
|
||||
assert_equals(data.result, "window.frameElement = null",
|
||||
"The frameElement attribute should be null.");
|
||||
t3.done();
|
||||
});
|
||||
}
|
||||
}, false);
|
||||
document.getElementById("iframe_3").contentWindow.postMessage(null, "*");
|
||||
})
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue