summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/web-locks/partitioned-web-locks.tentative.https.html
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--testing/web-platform/tests/web-locks/partitioned-web-locks.tentative.https.html119
1 files changed, 119 insertions, 0 deletions
diff --git a/testing/web-platform/tests/web-locks/partitioned-web-locks.tentative.https.html b/testing/web-platform/tests/web-locks/partitioned-web-locks.tentative.https.html
new file mode 100644
index 0000000000..d2f22f1964
--- /dev/null
+++ b/testing/web-platform/tests/web-locks/partitioned-web-locks.tentative.https.html
@@ -0,0 +1,119 @@
+
+<!DOCTYPE html>
+<meta charset="utf-8"/>
+<title>Web Locks API: Partitioned WebLocks</title>
+
+<!-- Pull in get_host_info() -->
+<script src="/common/get-host-info.sub.js"></script>
+<script src="/common/utils.js"></script>
+<script src="/common/dispatcher/dispatcher.js"></script>
+<script src="resources/helpers.js"></script>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<body>
+<script>
+
+const { HTTPS_ORIGIN, HTTPS_NOTSAMESITE_ORIGIN } = get_host_info();
+// Map of lock_id => function that releases a lock.
+const held = new Map();
+let next_lock_id = 1;
+
+async function third_party_test(t) {
+ let target_url = HTTPS_ORIGIN + '/web-locks/resources/iframe.html';
+ target_url = new URL(
+ `./resources/partitioned-parent.html?target=${encodeURIComponent(target_url)}`,
+ HTTPS_NOTSAMESITE_ORIGIN + self.location.pathname);
+
+ navigator.locks.request('testLock', {mode: 'exclusive', ifAvailable: true},
+ lock => {
+ if (lock === null) {
+ assert_true(false)
+ return;
+ }
+ let lock_id = next_lock_id++;
+ let release;
+ const promise = new Promise(r => { release = r; });
+ held.set(lock_id, release);
+ return promise;
+ });
+
+ const w = window.open(target_url);
+ const result = await new Promise(resolve => window.onmessage = resolve);
+
+ // When 3rd party storage partitioning is enabled, the iframe should be able
+ // to aquire a lock with the same name as one exclusively held by the opener
+ // of its top window, even when that opener has the same origin.
+ assert_equals(result.data.failed, undefined,
+ 'The 1p iframe failed to acquire the lock');
+
+ t.add_cleanup(() => {
+ w.close()
+ for(let i = 1; i < next_lock_id; i++){
+ held.get(i)();
+ }
+ });
+}
+
+promise_test(t => {
+ return third_party_test(t);
+}, 'WebLocks of an iframe under a 3rd-party site are partitioned');
+
+
+// Optional Test: Checking for partitioned web locks in an A->B->A
+// (nested-iframe with cross-site ancestor chain) scenario.
+
+// Map of lock_id => function that releases a lock.
+const held_2 = new Map();
+let next_lock_id_2 = 1;
+
+async function nested_iframe_test(t) {
+ // Create innermost child iframe (leaf).
+ let leaf_url = HTTPS_ORIGIN + '/web-locks/resources/iframe.html';
+ // Wrap the child iframe in its cross-origin parent (middle).
+ let middle_url = new URL(
+ `./resources/iframe-parent.html?target=${encodeURIComponent(leaf_url)}`,
+ HTTPS_NOTSAMESITE_ORIGIN + self.location.pathname);
+ // Embed the parent iframe in the top-level site (top).
+ let top_url = new URL(
+ `./resources/partitioned-parent.html?target=${encodeURIComponent(middle_url)}`,
+ HTTPS_ORIGIN + self.location.pathname);
+
+ // Request the weblock for the top-level site.
+ navigator.locks.request('testLock', {mode: 'exclusive', ifAvailable: true},
+ lock => {
+ if (lock === null) {
+ assert_true(false)
+ return;
+ }
+ // Obtain and store the release functions for clean-up.
+ let lock_id = next_lock_id_2++;
+ let release;
+ const promise = new Promise(r => { release = r; });
+ held_2.set(lock_id, release);
+ return promise;
+ }).catch(error => alert(error.message));
+
+ // Open the nested iframes. The script in the innermost child iframe
+ // will attempt to obtain the same weblock as above.
+ const w = window.open(top_url);
+ const result = await new Promise(resolve => window.onmessage = resolve);
+
+ // With third-party storage partitioning enabled, the same-site iframe
+ // should be able to acquire the lock as it has a cross-site ancestor
+ // and is partitioned separately from the top-level site.
+ assert_equals(result.data.failed, undefined,
+ 'The 1p iframe failed to acquire the lock');
+
+ t.add_cleanup(() => {
+ w.close()
+ for(let i = 1; i < next_lock_id_2; i++){
+ held_2.get(i)();
+ }
+ });
+}
+
+promise_test(t => {
+ return nested_iframe_test(t);
+}, 'WebLocks of a nested iframe with a cross-site ancestor are partitioned');
+</script>
+</body>