diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
commit | 26a029d407be480d791972afb5975cf62c9360a6 (patch) | |
tree | f435a8308119effd964b339f76abb83a57c29483 /testing/web-platform/tests/fenced-frame/default-enabled-features-attribute-allow.https.html | |
parent | Initial commit. (diff) | |
download | firefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz firefox-26a029d407be480d791972afb5975cf62c9360a6.zip |
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/default-enabled-features-attribute-allow.https.html')
-rw-r--r-- | testing/web-platform/tests/fenced-frame/default-enabled-features-attribute-allow.https.html | 72 |
1 files changed, 72 insertions, 0 deletions
diff --git a/testing/web-platform/tests/fenced-frame/default-enabled-features-attribute-allow.https.html b/testing/web-platform/tests/fenced-frame/default-enabled-features-attribute-allow.https.html new file mode 100644 index 0000000000..d1e857cf29 --- /dev/null +++ b/testing/web-platform/tests/fenced-frame/default-enabled-features-attribute-allow.https.html @@ -0,0 +1,72 @@ +<!DOCTYPE html> +<title>Test default permission policy features with allow="" attribute</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/utils.js"></script> +<script src="/common/dispatcher/dispatcher.js"></script> +<script src="resources/utils.js"></script> +<script src="/common/get-host-info.sub.js"></script> +<script src="resources/default-enabled-features-helper.js"></script> + +<body> +<script> +promise_test(async(t) => { + await runDefaultEnabledFeaturesTest(t, /*should_load=*/true, + get_host_info().ORIGIN, + generator_api="fledge", + allow="shared-storage *; attribution-reporting *"); + await runDefaultEnabledFeaturesTest(t, /*should_load=*/true, + get_host_info().ORIGIN, + generator_api="sharedstorage", + allow="shared-storage *; attribution-reporting *"); +}, 'Same-origin fenced frame with allow attribute enabling required features'); + +promise_test(async(t) => { + await runDefaultEnabledFeaturesTest(t, /*should_load=*/true, + get_host_info().REMOTE_ORIGIN, + generator_api="fledge", + allow="shared-storage *; attribution-reporting *"); + await runDefaultEnabledFeaturesTest(t, /*should_load=*/true, + get_host_info().REMOTE_ORIGIN, + generator_api="sharedstorage", + allow="shared-storage *; attribution-reporting *"); +}, 'Cross-origin fenced frame with allow attribute enabling required features'); + +promise_test(async(t) => { + const fencedframe = await attachFencedFrameContext({ + generator_api: "fledge", + headers: [["Permissions-Policy", "attribution-reporting=()"]], + origin: get_host_info().ORIGIN}); + + await fencedframe.execute(async () => { + assert_false(document.featurePolicy.allowsFeature('attribution-reporting'), + "Attribution reporting should NOT be allowed in the fenced frame."); + }, []); +}, 'Delivered policies can further restrict permissions of a fixed ' + + 'permissions fenced frame'); + +promise_test(async(t) => { + const fencedframe = await attachFencedFrameContext({ + headers: [["Permissions-Policy", "shared-storage=()"]], + origin: get_host_info().ORIGIN}); + + await fencedframe.execute(async () => { + assert_false( + document.featurePolicy.allowsFeature('shared-storage'), + "Shared storage should not be allowed in the fenced frame."); + assert_true( + document.featurePolicy.allowsFeature('private-aggregation'), + "Private aggregation should be allowed in the fenced frame."); + assert_false( + document.featurePolicy.allowsFeature('attribution-reporting'), + "Attribution reporting should be disallowed in the fenced frame."); + assert_false( + document.featurePolicy.allowsFeature('sync-xhr'), + "USB access should be disallowed in the fenced frame."); + }, []); +}, 'Delivered policies can further restrict permissions of a non-opaque ' + + 'fenced frame'); + +</script> +</body> +</html> |