36 lines
No EOL
1.7 KiB
HTML
36 lines
No EOL
1.7 KiB
HTML
<!DOCTYPE html>
|
|
<meta charset="utf-8">
|
|
<title>DBSC refresh does not send back Sec-Session-Challenge</title>
|
|
<script src="/resources/testharness.js"></script>
|
|
<script src="/resources/testharnessreport.js"></script>
|
|
<script src="helper.js" type="module"></script>
|
|
|
|
<script type="module">
|
|
import { expireCookie, waitForCookie, addCookieAndSessionCleanup, configureServer, setupShardedServerState, documentHasCookie } from "./helper.js";
|
|
|
|
promise_test(async t => {
|
|
await setupShardedServerState();
|
|
const expectedCookieAndValue = "auth_cookie=abcdef0123";
|
|
const expectedCookieAndAttributes = `${expectedCookieAndValue};Domain=${location.hostname};Path=/device-bound-session-credentials`;
|
|
addCookieAndSessionCleanup(t);
|
|
|
|
// Configure server to avoid sending back a challenge during refresh.
|
|
configureServer({ refreshSendsChallenge: false });
|
|
|
|
// Prompt starting a session, and wait until registration completes.
|
|
const loginResponse = await fetch('login.py');
|
|
assert_equals(loginResponse.status, 200);
|
|
await waitForCookie(expectedCookieAndValue, /*expectCookie=*/true);
|
|
|
|
// Confirm that a request has the cookie set.
|
|
const authResponse = await fetch('verify_authenticated.py');
|
|
assert_equals(authResponse.status, 200);
|
|
|
|
// Trigger refresh and confirm that the cookie gets set again.
|
|
expireCookie(expectedCookieAndAttributes);
|
|
assert_false(documentHasCookie(expectedCookieAndValue));
|
|
const authResponseAfterExpiry = await fetch('verify_authenticated.py');
|
|
assert_equals(authResponseAfterExpiry.status, 200);
|
|
assert_true(documentHasCookie(expectedCookieAndValue));
|
|
}, "Refresh does not send back Sec-Session-Challenge");
|
|
</script> |