diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
commit | 36d22d82aa202bb199967e9512281e9a53db42c9 (patch) | |
tree | 105e8c98ddea1c1e4784a60a5a6410fa416be2de /testing/web-platform/meta/storage-access-api | |
parent | Initial commit. (diff) | |
download | firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip |
Adding upstream version 115.7.0esr.upstream/115.7.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/meta/storage-access-api')
17 files changed, 247 insertions, 0 deletions
diff --git a/testing/web-platform/meta/storage-access-api/hasStorageAccess-ABA.tentative.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/hasStorageAccess-ABA.tentative.sub.https.window.js.ini new file mode 100644 index 0000000000..73b3a8cdfa --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/hasStorageAccess-ABA.tentative.sub.https.window.js.ini @@ -0,0 +1,6 @@ +[hasStorageAccess-ABA.tentative.sub.https.window.html] + [[ABA\] document.hasStorageAccess() should not be allowed by default unless in top-level frame or same-origin iframe.] + expected: FAIL + + [[ABA\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/hasStorageAccess-insecure.sub.window.js.ini b/testing/web-platform/meta/storage-access-api/hasStorageAccess-insecure.sub.window.js.ini new file mode 100644 index 0000000000..a31d80a0ce --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/hasStorageAccess-insecure.sub.window.js.ini @@ -0,0 +1,31 @@ +[hasStorageAccess-insecure.sub.window.html] + expected: [OK, TIMEOUT] + [[top-level-context\] document.hasStorageAccess() should be disallowed in insecure contexts] + expected: FAIL + + [[same-origin-frame\] document.hasStorageAccess() should be disallowed in insecure contexts] + expected: FAIL + + [[cross-origin-frame\] document.hasStorageAccess() should be disallowed in insecure contexts] + expected: FAIL + + [[nested-same-origin-frame\] document.hasStorageAccess() should be disallowed in insecure contexts] + expected: FAIL + + [[nested-cross-origin-frame\] document.hasStorageAccess() should be disallowed in insecure contexts] + expected: FAIL + + [[top-level-context\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL + + [[same-origin-frame\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL + + [[cross-origin-frame\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL + + [[nested-same-origin-frame\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL + + [[nested-cross-origin-frame\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/hasStorageAccess.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/hasStorageAccess.sub.https.window.js.ini new file mode 100644 index 0000000000..7769b8247c --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/hasStorageAccess.sub.https.window.js.ini @@ -0,0 +1,24 @@ +[hasStorageAccess.sub.https.window.html] + expected: [OK, TIMEOUT] + [[top-level-context\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL + + [[same-origin-frame\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL + + [[nested-same-origin-frame\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL + + [[cross-site-frame\] document.hasStorageAccess() should not be allowed by default unless in top-level frame or same-origin iframe.] + expected: + if os == "android": FAIL + + [[cross-site-frame\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL + + [[nested-cross-site-frame\] document.hasStorageAccess() should not be allowed by default unless in top-level frame or same-origin iframe.] + expected: + if os == "android": FAIL + + [[nested-cross-site-frame\] document.hasStorageAccess() should reject in a document that isn't fully active.] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/idlharness.window.js.ini b/testing/web-platform/meta/storage-access-api/idlharness.window.js.ini new file mode 100644 index 0000000000..d32879d3ca --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/idlharness.window.js.ini @@ -0,0 +1,3 @@ +[idlharness.window.html] + expected: + if (os == "android") and fission: [TIMEOUT, OK] diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-ABA.tentative.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-ABA.tentative.sub.https.window.js.ini new file mode 100644 index 0000000000..6bfbf0bfa8 --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-ABA.tentative.sub.https.window.js.ini @@ -0,0 +1,15 @@ +[requestStorageAccess-ABA.tentative.sub.https.window.html] + expected: + if (os == "android") and swgl: [OK, TIMEOUT] + if (os == "android") and not swgl: [OK, TIMEOUT] + [[ABA\] document.requestStorageAccess() should resolve in top-level frame or same-site iframe, otherwise reject with a NotAllowedError with no user gesture.] + expected: FAIL + + [[ABA\] document.requestStorageAccess() should be resolved with no user gesture when a permission grant exists, and should allow cookie access] + expected: FAIL + + [[ABA\] document.requestStorageAccess() should resolve without permission grant or user gesture] + expected: FAIL + + [[ABA\] document.requestStorageAccess() should resolve with denied permission] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-origin-iframe-navigation.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-origin-iframe-navigation.sub.https.window.js.ini new file mode 100644 index 0000000000..f55a572ed1 --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-origin-iframe-navigation.sub.https.window.js.ini @@ -0,0 +1,13 @@ +[requestStorageAccess-cross-origin-iframe-navigation.sub.https.window.html] + expected: TIMEOUT + [Self-initiated same-origin navigations preserve storage access] + expected: NOTRUN + + [Self-initiated reloads preserve storage access] + expected: TIMEOUT + + [Non-self-initiated same-origin navigations do not preserve storage access] + expected: NOTRUN + + [Self-initiated cross-origin navigations do not preserve storage access] + expected: NOTRUN diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-site-iframe.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-site-iframe.sub.https.window.js.ini new file mode 100644 index 0000000000..11ac29206c --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-site-iframe.sub.https.window.js.ini @@ -0,0 +1,16 @@ +[requestStorageAccess-cross-site-iframe.sub.https.window.html] + expected: + if (os == "android") and debug and swgl: [TIMEOUT, OK] + if (os == "android") and debug and not swgl: [OK, TIMEOUT] + if (os == "android") and not debug: [OK, TIMEOUT] + [[cross-site-frame\] document.requestStorageAccess() should be rejected with a NotAllowedError without permission grant] + expected: FAIL + + [[cross-site-frame\] document.requestStorageAccess() should be rejected with a NotAllowedError with denied permission] + expected: FAIL + + [[cross-site-frame\] document.requestStorageAccess() should be resolved with no user gesture when a permission grant exists, and should allow cookie access] + expected: FAIL + + [[cross-site-frame\] document.requestStorageAccess() should resolve in top-level frame or same-site iframe, otherwise reject with a NotAllowedError with no user gesture.] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-site-sibling-iframes.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-site-sibling-iframes.sub.https.window.js.ini new file mode 100644 index 0000000000..bd564fdab9 --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-cross-site-sibling-iframes.sub.https.window.js.ini @@ -0,0 +1,7 @@ +[requestStorageAccess-cross-site-sibling-iframes.sub.https.window.html] + expected: TIMEOUT + [Grants have per-frame scope] + expected: TIMEOUT + + [Cross-site sibling iframes should not be able to take advantage of the existing permission grant requested by others.] + expected: NOTRUN diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-insecure.sub.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-insecure.sub.window.js.ini new file mode 100644 index 0000000000..fa987125e5 --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-insecure.sub.window.js.ini @@ -0,0 +1,10 @@ +[requestStorageAccess-insecure.sub.window.html] + expected: TIMEOUT + [[non-fully-active\] document.requestStorageAccess() should reject when run in a detached frame] + expected: TIMEOUT + + [[non-fully-active\] document.requestStorageAccess() should reject when run in a detached DOMParser document] + expected: NOTRUN + + [[top-level-context\] document.requestStorageAccess() should be rejected when called with a user gesture in insecure context] + expected: NOTRUN diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-cross-origin-iframe.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-cross-origin-iframe.sub.https.window.js.ini new file mode 100644 index 0000000000..07285108d1 --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-cross-origin-iframe.sub.https.window.js.ini @@ -0,0 +1,18 @@ +[requestStorageAccess-nested-cross-origin-iframe.sub.https.window.html] + expected: + if (os == "android") and not swgl and not debug: [OK, TIMEOUT, ERROR] + if (os == "mac") and not debug: [OK, TIMEOUT] + if (os == "android") and swgl: [OK, TIMEOUT, ERROR] + if (os == "win") and not debug: [TIMEOUT, OK] + [OK, ERROR, TIMEOUT] + [[nested-cross-origin-frame\] document.requestStorageAccess() should be resolved with no user gesture when a permission grant exists, and should allow cookie access] + expected: FAIL + + [[nested-cross-origin-frame\] document.requestStorageAccess() should resolve in top-level frame or same-site iframe, otherwise reject with a NotAllowedError with no user gesture.] + expected: FAIL + + [[nested-cross-origin-frame\] document.requestStorageAccess() should resolve without permission grant or user gesture] + expected: FAIL + + [[nested-cross-origin-frame\] document.requestStorageAccess() should resolve with denied permission] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-cross-site-iframe.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-cross-site-iframe.sub.https.window.js.ini new file mode 100644 index 0000000000..ef562c30b1 --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-cross-site-iframe.sub.https.window.js.ini @@ -0,0 +1,16 @@ +[requestStorageAccess-nested-cross-site-iframe.sub.https.window.html] + expected: + if os == "mac": OK + if os == "win": OK + [OK, TIMEOUT] + [[nested-cross-site-frame\] document.requestStorageAccess() should be rejected with a NotAllowedError without permission grant] + expected: FAIL + + [[nested-cross-site-frame\] document.requestStorageAccess() should be rejected with a NotAllowedError with denied permission] + expected: FAIL + + [[nested-cross-site-frame\] document.requestStorageAccess() should be resolved with no user gesture when a permission grant exists, and should allow cookie access] + expected: FAIL + + [[nested-cross-site-frame\] document.requestStorageAccess() should resolve in top-level frame or same-site iframe, otherwise reject with a NotAllowedError with no user gesture.] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-same-origin-iframe.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-same-origin-iframe.sub.https.window.js.ini new file mode 100644 index 0000000000..6a9dc44ece --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-nested-same-origin-iframe.sub.https.window.js.ini @@ -0,0 +1,24 @@ +[requestStorageAccess-nested-same-origin-iframe.sub.https.window.html] + expected: + if (os == "win") and debug and (processor == "x86_64") and not swgl: [TIMEOUT, OK, ERROR] + if (os == "win") and debug and (processor == "x86_64") and swgl: [TIMEOUT, OK, ERROR] + if (os == "linux") and debug and not fission and swgl: OK + if (os == "android") and not swgl and not debug: [OK, TIMEOUT, ERROR] + if (os == "win") and not debug and (processor == "x86"): [TIMEOUT, OK] + if (os == "win") and not debug and (processor == "x86_64"): [OK, TIMEOUT] + if (os == "linux") and debug and fission: OK + if (os == "mac") and debug: [TIMEOUT, OK, ERROR] + if (os == "mac") and not debug: [TIMEOUT, OK] + if (os == "android") and swgl: [TIMEOUT, OK] + [OK, ERROR, TIMEOUT] + [[nested-same-origin-frame\] document.requestStorageAccess() should resolve without permission grant or user gesture] + expected: FAIL + + [[nested-same-origin-frame\] document.requestStorageAccess() should resolve with denied permission] + expected: FAIL + + [[nested-same-origin-frame\] document.requestStorageAccess() should be resolved with no user gesture when a permission grant exists, and should allow cookie access] + expected: FAIL + + [[nested-same-origin-frame\] document.requestStorageAccess() should resolve in top-level frame or same-site iframe, otherwise reject with a NotAllowedError with no user gesture.] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-non-fully-active.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-non-fully-active.sub.https.window.js.ini new file mode 100644 index 0000000000..b44e36118e --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-non-fully-active.sub.https.window.js.ini @@ -0,0 +1,7 @@ +[requestStorageAccess-non-fully-active.sub.https.window.html] + expected: TIMEOUT + [[non-fully-active\] document.requestStorageAccess() should not resolve when run in a detached frame] + expected: TIMEOUT + + [[non-fully-active\] document.requestStorageAccess() should not resolve when run in a detached DOMParser document] + expected: NOTRUN diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess-same-site-iframe.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess-same-site-iframe.sub.https.window.js.ini new file mode 100644 index 0000000000..58e7c6e8ab --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess-same-site-iframe.sub.https.window.js.ini @@ -0,0 +1,15 @@ +[requestStorageAccess-same-site-iframe.sub.https.window.html] + expected: + if (os == "mac") and debug: [TIMEOUT, OK] + [OK, TIMEOUT] + [[same-site-frame\] document.requestStorageAccess() should resolve in top-level frame or same-site iframe, otherwise reject with a NotAllowedError with no user gesture.] + expected: FAIL + + [[same-site-frame\] document.requestStorageAccess() should be resolved with no user gesture when a permission grant exists, and should allow cookie access] + expected: FAIL + + [[same-site-frame\] document.requestStorageAccess() should resolve without permission grant or user gesture] + expected: FAIL + + [[same-site-frame\] document.requestStorageAccess() should resolve with denied permission] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/requestStorageAccess.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/requestStorageAccess.sub.https.window.js.ini new file mode 100644 index 0000000000..6935961b6d --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/requestStorageAccess.sub.https.window.js.ini @@ -0,0 +1,18 @@ +[requestStorageAccess.sub.https.window.html] + [[top-level-context\] document.requestStorageAccess() should be resolved with no user gesture when a permission grant exists, and should allow cookie access] + expected: FAIL + + [[top-level-context\] document.requestStorageAccess() should resolve without permission grant or user gesture] + expected: NOTRUN + + [[top-level-context\] document.requestStorageAccess() should resolve with denied permission] + expected: NOTRUN + + [[top-level-context\] document.requestStorageAccess() should resolve without permission grant or user gesture] + expected: FAIL + + [[top-level-context\] document.requestStorageAccess() should resolve with denied permission] + expected: FAIL + + [[top-level-context\] document.requestStorageAccess() should resolve in top-level frame or same-site iframe, otherwise reject with a NotAllowedError with no user gesture.] + expected: FAIL diff --git a/testing/web-platform/meta/storage-access-api/storage-access-permission.sub.https.window.js.ini b/testing/web-platform/meta/storage-access-api/storage-access-permission.sub.https.window.js.ini new file mode 100644 index 0000000000..f5f3e0a44d --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/storage-access-permission.sub.https.window.js.ini @@ -0,0 +1,10 @@ +[storage-access-permission.sub.https.window.html] + expected: TIMEOUT + [Permissions grants are observable across same-origin iframes] + expected: TIMEOUT + + [IFrame tests] + expected: NOTRUN + + [Permissions grants are observable across same-site iframes] + expected: NOTRUN diff --git a/testing/web-platform/meta/storage-access-api/storageAccess.testdriver.sub.html.ini b/testing/web-platform/meta/storage-access-api/storageAccess.testdriver.sub.html.ini new file mode 100644 index 0000000000..ac235bcfb1 --- /dev/null +++ b/testing/web-platform/meta/storage-access-api/storageAccess.testdriver.sub.html.ini @@ -0,0 +1,14 @@ +[storageAccess.testdriver.sub.html] + expected: + if (os == "win") and debug: OK + if os == "android": OK + [OK, TIMEOUT] + [TestDriver - Set Storage Access Command Tests] + expected: FAIL + + [TestDriver - Set Storage Access Command Tests] + expected: + if not debug and (os == "linux") and fission: [FAIL, PASS] + if not debug and (os == "linux") and not fission: [FAIL, PASS] + if not debug and (os == "win"): [FAIL, PASS] + FAIL |