1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
|
<!DOCTYPE html>
<title>Test that trust token redemption is enabled/disabled according to the feature policy</title>
<body>
<script src=/resources/testharness.js></script>
<script src=/resources/testharnessreport.js></script>
<script src=/feature-policy/resources/featurepolicy.js></script>
<script>
'use strict';
const same_origin_src = '/feature-policy/experimental-features/resources/feature-policy-trust-token-redemption.html';
const cross_origin_src = 'https://{{domains[www]}}:{{ports[https][0]}}' +
same_origin_src;
const header = 'Default "trust-token-redemption" feature policy ["self"]';
test(() => {
try {
// The feature policy gates redemption and signing via both the Fetch
// and XHR interfaces.
new Request("https://issuer.example/", {
trustToken: {
type: "token-redemption"
}
});
new Request("https://destination.example/", {
trustToken: {
type: "send-redemption-record", // signing
issuers: ["https://issuer.example/"]
}
});
const redemption_xhr = new XMLHttpRequest();
redemption_xhr.open("GET", "https://issuer.example/");
redemption_xhr.setTrustToken({
type: "token-redemption"
});
const signing_xhr = new XMLHttpRequest();
signing_xhr.open("GET", "https://destination.example/");
signing_xhr.setTrustToken({
type: "send-redemption-record", // signing
issuers: ["https://issuer.example/"]
});
} catch (e) {
assert_unreached();
}
}, header + ' allows the top-level document.');
async_test(t => {
test_feature_availability('Trust token redemption', t, same_origin_src,
(data, desc) => {
assert_equals(data.num_operations_enabled, 4, desc);
});
}, header + ' allows same-origin iframes.');
async_test(t => {
test_feature_availability('Trust token redemption', t, cross_origin_src,
(data, desc) => {
assert_equals(data.num_operations_enabled, 0, desc);
});
}, header + ' disallows cross-origin iframes.');
</script>
</body>
|