diff options
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/default-enabled-features-allow-all.https.html')
-rw-r--r-- | testing/web-platform/tests/fenced-frame/default-enabled-features-allow-all.https.html | 74 |
1 files changed, 74 insertions, 0 deletions
diff --git a/testing/web-platform/tests/fenced-frame/default-enabled-features-allow-all.https.html b/testing/web-platform/tests/fenced-frame/default-enabled-features-allow-all.https.html new file mode 100644 index 0000000000..5d38d7a710 --- /dev/null +++ b/testing/web-platform/tests/fenced-frame/default-enabled-features-allow-all.https.html @@ -0,0 +1,74 @@ +<!DOCTYPE html> +<title>Test default permission policy features gating (*)</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/utils.js"></script> +<script src="/common/dispatcher/dispatcher.js"></script> +<script src="resources/utils.js"></script> +<script src="/common/get-host-info.sub.js"></script> +<script src="resources/default-enabled-features-helper.js"></script> + +<body> +<script> +promise_test(async(t) => { + await runDefaultEnabledFeaturesTest(t, true, get_host_info().ORIGIN); + await runDefaultEnabledFeaturesTest(t, true, get_host_info().ORIGIN, + generator_api="sharedstorage"); +}, 'Same-origin fenced frame loads when feature policies are *'); + +promise_test(async(t) => { + await runDefaultEnabledFeaturesTest(t, true, get_host_info().REMOTE_ORIGIN); + await runDefaultEnabledFeaturesTest(t, true, get_host_info().REMOTE_ORIGIN, + generator_api="sharedstorage"); +}, 'Cross-origin fenced frame loads when feature policies are *'); + +promise_test(async(t) => { + // We do this test the "old fashioned way" because a redirect in a fenced + // frame remote context will cause it to lose its ability to communicate with + // the main page (which results in a timeout). + const page1_key = token(); + const redirect_key = token(); + + const fencedframe = attachFencedFrame( + await generateURNFromFledge( + "resources/default-enabled-features-navigate.https.html", + [page1_key, redirect_key])); + + // The fenced frame will send its attribution reporting result and then + // attempt to redirect to a remote origin page. + const page1_resp = await nextValueFromServer(page1_key); + assert_equals(page1_resp, "true", + "Attribution reporting should be enabled on the original page."); + + // The fenced frame will send its attribution reporting result and then + // attempt to redirect to a remote origin page. + const redirect_resp = await nextValueFromServer(redirect_key); + assert_equals(redirect_resp, "true", + "Attribution reporting should be enabled on the redirected page."); +}, 'A fenced frame that navigates itself to a cross origin page that allows feature policies ' + + 'can still access the feature policies'); + +promise_test(async(t) => { + const fencedframe = await attachFencedFrameContext({ + origin: get_host_info().REMOTE_ORIGIN}); + + await fencedframe.execute(async () => { + assert_true( + document.featurePolicy.allowsFeature('shared-storage'), + "Shared storage should be allowed in the fenced frame."); + assert_true( + document.featurePolicy.allowsFeature('private-aggregation'), + "Private aggregation should be allowed in the fenced frame."); + assert_false( + document.featurePolicy.allowsFeature('attribution-reporting'), + "Attribution reporting should be disallowed in the fenced frame."); + assert_false( + document.featurePolicy.allowsFeature('sync-xhr'), + "USB access should be disallowed in the fenced frame."); + }, []); +}, 'Cross-origin fenced frames default feature policies follow inheritance' + + ' rules.'); + +</script> +</body> +</html> |