summaryrefslogtreecommitdiffstats
path: root/dom/security/test/general/file_same_site_cookies_redirect.sjs
blob: f7451fb50465304c86234b90a9ff020b03e74fbe (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
// Custom *.sjs file specifically for the needs of Bug 1453814

// small red image
const IMG_BYTES = atob(
  "iVBORw0KGgoAAAANSUhEUgAAAAUAAAAFCAYAAACNbyblAAAAHElEQVQI12" +
    "P4//8/w38GIAXDIBKE0DHxgljNBAAO9TXL0Y4OHwAAAABJRU5ErkJggg=="
);

const FRAME = `
  <!DOCTYPE html>
  <html>
  <head>
    <title>Bug 1453814 - Do not allow same-site cookies for cross origin redirect</title>
  </head>
  <body>
    <script type="application/javascript">
      let cookie = document.cookie;
      // now reset the cookie for the next test
      document.cookie = "myKey=;" + "expires=Thu, 01 Jan 1970 00:00:00 GMT";
      window.parent.postMessage({result: cookie}, 'http://mochi.test:8888');
    </script>
  </body>
  </html>`;

const SAME_ORIGIN = "http://mochi.test:8888/";
const CROSS_ORIGIN = "http://example.com/";
const PATH =
  "tests/dom/security/test/general/file_same_site_cookies_redirect.sjs";

const FRAME_META_REFRESH_SAME =
  `
  <html><head>
  <meta http-equiv="refresh" content="0;
   url='` +
  SAME_ORIGIN +
  PATH +
  `?loadFrame'">
  </head></html>`;

const FRAME_META_REFRESH_CROSS =
  `
  <html><head>
  <meta http-equiv="refresh" content="0;
   url='` +
  CROSS_ORIGIN +
  PATH +
  `?loadFrame'">
  </head></html>`;

function handleRequest(request, response) {
  // avoid confusing cache behaviors
  response.setHeader("Cache-Control", "no-cache", false);

  if (request.queryString === "setSameSiteCookie") {
    response.setHeader(
      "Set-Cookie",
      "myKey=strictSameSiteCookie; samesite=strict",
      true
    );
    response.setHeader("Content-Type", "image/png");
    response.write(IMG_BYTES);
    return;
  }

  if (request.queryString === "sameToSameRedirect") {
    let URL = SAME_ORIGIN + PATH + "?loadFrame";
    response.setStatusLine("1.1", 302, "Found");
    response.setHeader("Location", URL, false);
    return;
  }

  if (request.queryString === "sameToCrossRedirect") {
    let URL = CROSS_ORIGIN + PATH + "?loadFrame";
    response.setStatusLine("1.1", 302, "Found");
    response.setHeader("Location", URL, false);
    return;
  }

  if (request.queryString === "crossToSameRedirect") {
    let URL = SAME_ORIGIN + PATH + "?loadFrame";
    response.setStatusLine("1.1", 302, "Found");
    response.setHeader("Location", URL, false);
    return;
  }

  if (request.queryString === "sameToCrossRedirectMeta") {
    response.write(FRAME_META_REFRESH_CROSS);
    return;
  }

  if (request.queryString === "crossToSameRedirectMeta") {
    response.write(FRAME_META_REFRESH_SAME);
    return;
  }

  if (request.queryString === "loadFrame") {
    response.write(FRAME);
    return;
  }

  // we should never get here, but just in case return something unexpected
  response.write("D'oh");
}