diff options
Diffstat (limited to 'testing/web-platform/tests/storage-access-api/requestStorageAccess-cross-site-sibling-iframes.sub.https.window.js')
-rw-r--r-- | testing/web-platform/tests/storage-access-api/requestStorageAccess-cross-site-sibling-iframes.sub.https.window.js | 81 |
1 files changed, 81 insertions, 0 deletions
diff --git a/testing/web-platform/tests/storage-access-api/requestStorageAccess-cross-site-sibling-iframes.sub.https.window.js b/testing/web-platform/tests/storage-access-api/requestStorageAccess-cross-site-sibling-iframes.sub.https.window.js new file mode 100644 index 0000000000..c93673887c --- /dev/null +++ b/testing/web-platform/tests/storage-access-api/requestStorageAccess-cross-site-sibling-iframes.sub.https.window.js @@ -0,0 +1,81 @@ +// META: script=helpers.js +// META: script=/cookies/resources/cookie-helper.sub.js +// META: script=/resources/testdriver.js +// META: script=/resources/testdriver-vendor.js +'use strict'; + +(async function() { + // This is on the www subdomain, so it's cross-origin from the current document. + const www = "https://{{domains[www]}}:{{ports[https][0]}}"; + // This is on the alt host, so it's cross-site from the current document. + const wwwAlt = "https://{{hosts[alt][]}}:{{ports[https][0]}}"; + const url_suffix = "/storage-access-api/resources/script-with-cookie-header.py?script=embedded_responder.js"; + + promise_test(async (t) => { + await MaybeSetStorageAccess("*", "*", "blocked"); + const responder_html = `${wwwAlt}${url_suffix}`; + const [frame1, frame2] = await Promise.all([ + CreateFrame(responder_html), + CreateFrame(responder_html), + ]); + + t.add_cleanup(async () => { + await test_driver.delete_all_cookies(); + await SetPermissionInFrame(frame1, [{ name: 'storage-access' }, 'prompt']); + await MaybeSetStorageAccess("*", "*", "allowed"); + }); + + await SetPermissionInFrame(frame1, [{ name: 'storage-access' }, 'granted']); + + assert_false(await FrameHasStorageAccess(frame1), "frame1 should not have storage access initially."); + assert_false(await FrameHasStorageAccess(frame2), "frame2 should not have storage access initially."); + + assert_false(await CanFrameWriteCookies(frame1), "frame1 should not have access via document.cookie."); + assert_false(await CanFrameWriteCookies(frame2), "frame2 should not have access via document.cookie."); + + assert_true(await RequestStorageAccessInFrame(frame1), "requestStorageAccess doesn't require a gesture since the permission has already been granted."); + + assert_true(await FrameHasStorageAccess(frame1), "frame1 should have storage access now."); + assert_true(await CanFrameWriteCookies(frame1), "frame1 should now be able to write cookies via document.cookie."); + + assert_false(await FrameHasStorageAccess(frame2), "frame2 should still not have storage access."); + assert_false(await CanFrameWriteCookies(frame2), "frame2 should still be unable to write cookies via document.cookie"); + + assert_true(await RequestStorageAccessInFrame(frame2), "frame2 should be able to get storage access without a gesture."); + + assert_true(await FrameHasStorageAccess(frame2), "frame2 should have storage access after it requested it."); + assert_true(await CanFrameWriteCookies(frame2), "frame2 should be able to write cookies via document.cookie after getting storage access."); + }, "Grants have per-frame scope"); + + promise_test(async (t) => { + await MaybeSetStorageAccess("*", "*", "blocked"); + const [crossOriginFrame, crossSiteFrame] = await Promise.all([ + CreateFrame(`${www}${url_suffix}`), + CreateFrame(`${wwwAlt}${url_suffix}`), + ]); + + t.add_cleanup(async () => { + await test_driver.delete_all_cookies(); + await SetPermissionInFrame(crossOriginFrame, [{ name: 'storage-access' }, 'prompt']); + await SetPermissionInFrame(crossSiteFrame, [{ name: 'storage-access' }, 'prompt']); + await MaybeSetStorageAccess("*", "*", "allowed"); + }); + + await SetPermissionInFrame(crossOriginFrame, [{ name: 'storage-access' }, 'granted']); + await SetPermissionInFrame(crossSiteFrame, [{ name: 'storage-access' }, 'granted']); + + assert_true(await RequestStorageAccessInFrame(crossOriginFrame), "crossOriginFrame should be able to get storage access without a gesture."); + assert_true(await RequestStorageAccessInFrame(crossSiteFrame), "crossSiteFrame should be able to get storage access without a gesture."); + + await SetDocumentCookieFromFrame(crossOriginFrame, `cookie=monster;Secure;SameSite=None;Path=/`); + await SetDocumentCookieFromFrame(crossSiteFrame, `foo=bar;Secure;SameSite=None;Path=/`); + + assert_true(cookieStringHasCookie("cookie", "monster", await FetchSubresourceCookiesFromFrame(crossOriginFrame, www)),"crossOriginFrame making same-origin subresource request can access cookies."); + assert_true(cookieStringHasCookie("foo", "bar", await FetchSubresourceCookiesFromFrame(crossSiteFrame, wwwAlt)),"crossSiteFrame making same-origin subresource request can access cookies."); + + assert_false(cookieStringHasCookie("foo", "bar", await FetchSubresourceCookiesFromFrame(crossOriginFrame, wwwAlt)), "crossOriginFrame making cross-site subresource request to sibling iframe's host should not include cookies."); + assert_false(cookieStringHasCookie("cookie", "monster", await FetchSubresourceCookiesFromFrame(crossSiteFrame, www)),"crossSiteFrame making cross-site subresource request to sibling iframe's host should not include cookies."); + + }, "Cross-site sibling iframes should not be able to take advantage of the existing permission grant requested by others."); + +})(); |