1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
|
// META: script=/common/dispatcher/dispatcher.js
// META: script=/common/utils.js
// META: script=resources/support.sub.js
//
// Spec: https://wicg.github.io/private-network-access/#integration-fetch
//
// These tests verify that non-secure contexts cannot navigate iframes to
// less-public address spaces, and can navigate them otherwise.
//
// This file covers only those tests that must execute in a non secure context.
// Other tests are defined in: iframe.https.window.js
setup(() => {
// Making sure we are in a non secure context, as expected.
assert_false(window.isSecureContext);
});
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_LOCAL },
target: { server: Server.HTTP_LOCAL },
expected: IframeTestResult.SUCCESS,
}), "local to local: no preflight required.");
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_LOCAL },
target: { server: Server.HTTP_PRIVATE },
expected: IframeTestResult.SUCCESS,
}), "local to private: no preflight required.");
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_LOCAL },
target: { server: Server.HTTP_PUBLIC },
expected: IframeTestResult.SUCCESS,
}), "local to public: no preflight required.");
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_PRIVATE },
target: { server: Server.HTTP_LOCAL },
expected: IframeTestResult.FAILURE,
}), "private to local: failure.");
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_PRIVATE },
target: { server: Server.HTTP_PRIVATE },
expected: IframeTestResult.SUCCESS,
}), "private to private: no preflight required.");
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_PRIVATE },
target: { server: Server.HTTP_PUBLIC },
expected: IframeTestResult.SUCCESS,
}), "private to public: no preflight required.");
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: { server: Server.HTTP_LOCAL },
expected: IframeTestResult.FAILURE,
}), "public to local: failure.");
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: { server: Server.HTTP_PRIVATE },
expected: IframeTestResult.FAILURE,
}), "public to private: failure.");
promise_test_parallel(t => iframeTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: { server: Server.HTTP_PUBLIC },
expected: IframeTestResult.SUCCESS,
}), "public to public: no preflight required.");
promise_test_parallel(t => iframeTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: { server: Server.HTTP_LOCAL },
expected: IframeTestResult.FAILURE,
}), "treat-as-public-address to local: failure.");
promise_test_parallel(t => iframeTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: { server: Server.HTTP_PRIVATE },
expected: IframeTestResult.FAILURE,
}), "treat-as-public-address to private: failure.");
promise_test_parallel(t => iframeTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: { server: Server.HTTP_PUBLIC },
expected: IframeTestResult.SUCCESS,
}), "treat-as-public-address to public: no preflight required.");
// The following test verifies that when a grandparent frame navigates its
// grandchild, the IP address space of the grandparent is compared against the
// IP address space of the response. Indeed, the navigation initiator in this
// case is the grandparent, not the parent.
iframeGrandparentTest({
name: "local to local, grandparent navigates: success.",
grandparentServer: Server.HTTP_LOCAL,
child: { server: Server.HTTP_PUBLIC },
grandchild: { server: Server.HTTP_LOCAL },
expected: IframeTestResult.SUCCESS,
});
|