diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:22:09 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:22:09 +0000 |
commit | 43a97878ce14b72f0981164f87f2e35e14151312 (patch) | |
tree | 620249daf56c0258faa40cbdcf9cfba06de2a846 /testing/web-platform/tests/cookies/prefix/__secure.header.https.html | |
parent | Initial commit. (diff) | |
download | firefox-upstream.tar.xz firefox-upstream.zip |
Adding upstream version 110.0.1.upstream/110.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/cookies/prefix/__secure.header.https.html')
-rw-r--r-- | testing/web-platform/tests/cookies/prefix/__secure.header.https.html | 79 |
1 files changed, 79 insertions, 0 deletions
diff --git a/testing/web-platform/tests/cookies/prefix/__secure.header.https.html b/testing/web-platform/tests/cookies/prefix/__secure.header.https.html new file mode 100644 index 0000000000..a6fee03b0c --- /dev/null +++ b/testing/web-platform/tests/cookies/prefix/__secure.header.https.html @@ -0,0 +1,79 @@ +<!DOCTYPE html> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/cookies/resources/cookie-helper.sub.js"></script> +<script> + ["", "MaxAge=10", "HttpOnly"].forEach(extraParams => { + // Without 'secure' + set_prefixed_cookie_via_http_test({ + prefix: "__Secure-", + params: "Path=/;" + extraParams, + origin: self.origin, + shouldExistViaHTTP: false, + title: "__Secure: secure origin: Should not set 'Path=/;" + extraParams + "'" + }); + + set_prefixed_cookie_via_http_test({ + prefix: "__SeCuRe-", + params: "Path=/;" + extraParams, + origin: self.origin, + shouldExistViaHTTP: false, + title: "__SeCuRe: secure origin: Should not set 'Path=/;" + extraParams + "'" + }); + + // With 'secure' + set_prefixed_cookie_via_http_test({ + prefix: "__Secure-", + params: "Secure;Path=/;" + extraParams, + origin: self.origin, + shouldExistViaHTTP: true, + title: "__Secure: secure origin: Should set 'Secure;Path=/;" + extraParams + "'" + }); + + set_prefixed_cookie_via_http_test({ + prefix: "__SeCuRe-", + params: "Secure;Path=/;" + extraParams, + origin: self.origin, + shouldExistViaHTTP: true, + title: "__SeCuRe: secure origin: Should set 'Secure;Path=/;" + extraParams + "'" + }); + }); + + // Without 'secure' + set_prefixed_cookie_via_http_test({ + prefix: "__Secure-", + // SameSite=None is necessary because cross-site origins cannot set SameSite cookies via fetch. + params: "Path=/;SameSite=None;domain=" + CROSS_SITE_HOST, + origin: SECURE_CROSS_SITE_ORIGIN, + shouldExistViaHTTP: false, + title: "__Secure: secure origin: Should not set 'Path=/;domain=" + CROSS_SITE_HOST + "'" + }); + + set_prefixed_cookie_via_http_test({ + prefix: "__SeCuRe-", + // SameSite=None is necessary because cross-site origins cannot set SameSite cookies via fetch. + params: "Path=/;SameSite=None;domain=" + CROSS_SITE_HOST, + origin: SECURE_CROSS_SITE_ORIGIN, + shouldExistViaHTTP: false, + title: "__SeCuRe: secure origin: Should not set 'Path=/;domain=" + CROSS_SITE_HOST + "'" + }); + + // With 'secure' + set_prefixed_cookie_via_http_test({ + prefix: "__Secure-", + // SameSite=None is necessary because cross-site origins cannot set SameSite cookies via fetch. + params: "Secure;SameSite=None;Path=/;domain=" + CROSS_SITE_HOST, + origin: SECURE_CROSS_SITE_ORIGIN, + shouldExistViaHTTP: true, + title: "__Secure: secure origin: Should set 'Secure;Path=/;domain=" + CROSS_SITE_HOST + "'" + }); + + set_prefixed_cookie_via_http_test({ + prefix: "__SeCuRe-", + // SameSite=None is necessary because cross-site origins cannot set SameSite cookies via fetch. + params: "Secure;SameSite=None;Path=/;domain=" + CROSS_SITE_HOST, + origin: SECURE_CROSS_SITE_ORIGIN, + shouldExistViaHTTP: true, + title: "__SeCuRe: secure origin: Should set 'Secure;Path=/;domain=" + CROSS_SITE_HOST + "'" + }); +</script> |