summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/webauthn/createcredential-cross-origin-iframe.https.sub.html
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /testing/web-platform/tests/webauthn/createcredential-cross-origin-iframe.https.sub.html
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/webauthn/createcredential-cross-origin-iframe.https.sub.html')
-rw-r--r--testing/web-platform/tests/webauthn/createcredential-cross-origin-iframe.https.sub.html106
1 files changed, 106 insertions, 0 deletions
diff --git a/testing/web-platform/tests/webauthn/createcredential-cross-origin-iframe.https.sub.html b/testing/web-platform/tests/webauthn/createcredential-cross-origin-iframe.https.sub.html
new file mode 100644
index 0000000000..ecf99f68a2
--- /dev/null
+++ b/testing/web-platform/tests/webauthn/createcredential-cross-origin-iframe.https.sub.html
@@ -0,0 +1,106 @@
+<!DOCTYPE html>
+<meta charset="utf-8">
+<title>WebAuthn credential.create() in a cross-origin iframe tests</title>
+<meta name="timeout" content="long">
+<link rel="help" href="https://w3c.github.io/webauthn/#publickey-credentials-create-feature">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="/resources/testdriver.js"></script>
+<script src="/resources/testdriver-vendor.js"></script>
+<script src=helpers.js></script>
+<body></body>
+<script>
+standardSetup(function() {
+ "use strict";
+
+ const targetOrigin = "https://{{hosts[alt][www]}}:{{ports[https][0]}}";
+
+ // Returns a |Promise| that gets resolved with |event.data| when |window|
+ // receives a "message" event whose |event.data.type| matches the string
+ // |message_data_type|.
+ function getMessageData(message_data_type) {
+ return new Promise(resolve => {
+ function waitAndRemove(e) {
+ if (!e.data || e.data.type != message_data_type)
+ return;
+ window.removeEventListener("message", waitAndRemove);
+ resolve(e.data);
+ }
+ window.addEventListener("message", waitAndRemove);
+ });
+ }
+
+ // Creates an iframe with the given `src` and (optional) allow attribute.
+ // Waits for the iframe to load, based on receiving a "subframe-loaded"
+ // message from the iframe.
+ async function createIframe(test, src, allow) {
+ const iframeElement = document.createElement("iframe");
+ document.body.appendChild(iframeElement);
+ test.add_cleanup(() => {
+ iframeElement.remove();
+ });
+
+ if (allow !== undefined) {
+ iframeElement.allow = allow;
+ }
+
+ const loadedPromise = getMessageData("subframe-loaded");
+ iframeElement.src = src;
+ await loadedPromise;
+
+ return iframeElement;
+ }
+
+ promise_test(async (test) => {
+ const src = `${targetOrigin}/webauthn/resources/webauthn-subframe.sub.html`;
+ const iframe = await createIframe(test, src);
+
+ const resultPromise = getMessageData("result");
+ iframe.contentWindow.postMessage({type: "create-credential"}, {targetOrigin: targetOrigin});
+ const data = await resultPromise;
+
+ assert_equals(data.result, "failure");
+ assert_equals(data.error.name, "NotAllowedError");
+ }, "create() in cross-origin iframe fails without permissions policy");
+
+ promise_test(async (test) => {
+ const src = `${targetOrigin}/webauthn/resources/webauthn-subframe.sub.html`;
+ const iframe = await createIframe(test, src, "publickey-credentials-create");
+
+ const resultPromise = getMessageData("result");
+ iframe.contentWindow.postMessage({type: "create-credential", addUserActivation: false}, {targetOrigin: targetOrigin});
+ const data = await resultPromise;
+
+ assert_equals(data.result, "failure");
+ assert_equals(data.error.name, "NotAllowedError");
+ }, "create() in cross-origin iframe fails with permissions policy but no user activation");
+
+ promise_test(async (test) => {
+ const src = `${targetOrigin}/webauthn/resources/webauthn-subframe.sub.html`;
+ const iframe = await createIframe(test, src, "publickey-credentials-create");
+
+ const resultPromise = getMessageData("result");
+ iframe.contentWindow.postMessage({type: "create-credential", addUserActivation: true}, {targetOrigin: targetOrigin});
+ const data = await resultPromise;
+
+ assert_equals(data.result, "success", `Expected success but got error: "${data.errorMessage}"`);
+ }, "create() in cross-origin iframe succeeds with permissions policy and user activation");
+
+ promise_test(async (test) => {
+ const src = `${targetOrigin}/webauthn/resources/webauthn-subframe.sub.html`;
+ const iframe = await createIframe(test, src, "publickey-credentials-create");
+
+ // For this call, we have a user activation in this main frame, but not
+ // in the iframe. That shouldn't be sufficient - the user activation has
+ // to be on the iframe itself.
+ await test_driver.bless("create credential, main frame activation");
+ const resultPromise = getMessageData("result");
+ iframe.contentWindow.postMessage({type: "create-credential", addUserActivation: false}, {targetOrigin: targetOrigin});
+ const data = await resultPromise;
+
+ assert_equals(data.result, "failure");
+ assert_equals(data.error.name, "NotAllowedError");
+ }, "create() in cross-origin iframe requires user activation on the iframe, not the main frame");
+});
+</script>
+