File: fence-report-event-cross-origin.sub.https.html

package info (click to toggle)
firefox-esr 140.4.0esr-1~deb13u1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 4,539,284 kB
  • sloc: cpp: 7,381,286; javascript: 6,388,710; ansic: 3,710,139; python: 1,393,780; xml: 628,165; asm: 426,916; java: 184,004; sh: 65,742; makefile: 19,302; objc: 13,059; perl: 12,912; yacc: 4,583; cs: 3,846; pascal: 3,352; lex: 1,720; ruby: 1,226; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (63 lines) | stat: -rw-r--r-- 2,455 bytes parent folder | download | duplicates (12)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
<!DOCTYPE html>
<title>Test window.fence.reportEvent from cross-origin subframes.</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/utils.js"></script>
<script src="/common/dispatcher/dispatcher.js"></script>
<script src="/common/get-host-info.sub.js"></script>
<script src="resources/automatic-beacon-helper.js"></script>
<script src="resources/utils.js"></script>

<body>
<script>
promise_test(async(t) => {
  const fencedframe = await attachFencedFrameContext({
    generator_api: 'fledge',
    headers: [[
      'Allow-Cross-Origin-Event-Reporting', '?1'
    ]],
    register_beacon: true,
    origin: 'https://{{hosts[alt][]}}:{{ports[https][0]}}',
  });
  await fencedframe.execute(async () => {
    const iframe = await attachIFrameContext({
      origin: 'https://{{hosts[alt][]}}:{{ports[https][1]}}'
    });
    await iframe.execute(() => {
      const destination_url = new URL(BEACON_URL + "?type=url",
          get_host_info().HTTPS_ORIGIN);
      window.fence.reportEvent({
        eventType: "click",
        eventData: "enum",
        destination: ["buyer"],
        crossOriginExposed: true
      });
      window.fence.reportEvent({
        destinationURL: destination_url,
        crossOriginExposed: true
      });
    });
  });
  // Check that both the destination enum and destination URL events were
  // reported.
  const [enum_origin, enum_referrer] = await nextBeacon("click", "enum")
      .then(data => data.split(','));
  const [url_origin, url_referrer] = await nextBeacon("url", "<No data>")
      .then(data => data.split(','));

  // Check the "Origin" headers are set to the origin that supplied the
  // reporting URL. For destination enum events, that's the origin of the
  // worklet. For destination URL events, that's the origin of the iframe.
  assert_equals(enum_origin, get_host_info().HTTPS_ORIGIN,
      'The enum origin should be correctly set.');
  assert_equals(url_origin, 'https://{{hosts[alt][]}}:{{ports[https][1]}}',
      'The url origin should be correctly set.');

  assert_equals(enum_referrer,
      'https://{{hosts[alt][]}}:{{ports[https][1]}}/',
      'The enum referrer should be correctly set.');
  assert_equals(url_referrer, 'https://{{hosts[alt][]}}:{{ports[https][1]}}/',
      'The url referrer should be correctly set.');
}, 'window.fence.reportEvent from a cross-origin subframe');
</script>
</body>