File: fenced-frame-no-preflight-required.tentative.https.window.js

package info (click to toggle)
thunderbird 1%3A128.14.0esr-1~deb13u1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 4,334,960 kB
  • sloc: cpp: 7,391,917; javascript: 5,617,271; ansic: 3,833,216; python: 1,230,742; xml: 619,690; asm: 456,020; java: 179,892; sh: 118,796; makefile: 21,906; perl: 14,825; objc: 12,399; yacc: 4,583; pascal: 2,973; lex: 1,720; ruby: 1,190; exp: 762; sql: 674; awk: 580; php: 436; lisp: 430; sed: 70; csh: 10
file content (91 lines) | stat: -rw-r--r-- 2,657 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
// META: script=/common/dispatcher/dispatcher.js
// META: script=/common/utils.js
// META: script=resources/support.sub.js
// META: script=/fenced-frame/resources/utils.js
// META: timeout=long
//
// Spec: https://wicg.github.io/private-network-access/#integration-fetch
//
// These tests verify that contexts can navigate fenced frames to more-public or
// same address spaces without private network access preflight request header.

setup(() => {
  assert_true(window.isSecureContext);
});

// Source: secure local context.
//
// All fetches unaffected by Private Network Access.

promise_test(
    t => fencedFrameTest(t, {
      source: {server: Server.HTTPS_LOCAL},
      target: {server: Server.HTTPS_LOCAL},
      expected: FrameTestResult.SUCCESS,
    }),
    'local to local: no preflight required.');

promise_test(
    t => fencedFrameTest(t, {
      source: {server: Server.HTTPS_LOCAL},
      target: {server: Server.HTTPS_PRIVATE},
      expected: FrameTestResult.SUCCESS,
    }),
    'local to private: no preflight required.');

promise_test(
    t => fencedFrameTest(t, {
      source: {server: Server.HTTPS_LOCAL},
      target: {server: Server.HTTPS_PUBLIC},
      expected: FrameTestResult.SUCCESS,
    }),
    'local to public: no preflight required.');

promise_test(
    t => fencedFrameTest(t, {
      source: {server: Server.HTTPS_PRIVATE},
      target: {server: Server.HTTPS_PRIVATE},
      expected: FrameTestResult.SUCCESS,
    }),
    'private to private: no preflight required.');

promise_test(
    t => fencedFrameTest(t, {
      source: {server: Server.HTTPS_PRIVATE},
      target: {server: Server.HTTPS_PUBLIC},
      expected: FrameTestResult.SUCCESS,
    }),
    'private to public: no preflight required.');

promise_test(
    t => fencedFrameTest(t, {
      source: {server: Server.HTTPS_PUBLIC},
      target: {server: Server.HTTPS_PUBLIC},
      expected: FrameTestResult.SUCCESS,
    }),
    'public to public: no preflight required.');

promise_test(
    t => fencedFrameTest(t, {
      source: {
        server: Server.HTTPS_LOCAL,
        treatAsPublic: true,
      },
      target: {server: Server.HTTPS_PUBLIC},
      expected: FrameTestResult.SUCCESS,
    }),
    'treat-as-public-address to public: no preflight required.');

promise_test(
    t => fencedFrameTest(t, {
      source: {
        server: Server.HTTPS_LOCAL,
        treatAsPublic: true,
      },
      target: {
        server: Server.HTTPS_PUBLIC,
        behavior: {preflight: PreflightBehavior.optionalSuccess(token())}
      },
      expected: FrameTestResult.SUCCESS,
    }),
    'treat-as-public-address to local: optional preflight');