File: preload-referrer-policy-subresource-header.tentative.html

package info (click to toggle)
thunderbird 1%3A140.5.0esr-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-proposed-updates
  • size: 4,609,180 kB
  • sloc: cpp: 7,672,739; javascript: 5,901,898; ansic: 3,898,899; python: 1,413,347; xml: 653,997; asm: 462,284; java: 180,927; sh: 113,491; makefile: 20,463; perl: 14,288; objc: 13,059; yacc: 4,583; pascal: 3,352; lex: 1,720; ruby: 1,222; exp: 762; sql: 715; awk: 580; php: 436; lisp: 430; sed: 70; csh: 10
file content (85 lines) | stat: -rw-r--r-- 3,799 bytes parent folder | download | duplicates (12)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
<!DOCTYPE html>
<meta charset=utf-8>
<meta name=variant content="?isCrossOriginPreload=true&isCrossOriginResource=true">
<meta name=variant content="?isCrossOriginPreload=true&isCrossOriginResource=false">
<meta name=variant content="?isCrossOriginPreload=false&isCrossOriginResource=true">
<meta name=variant content="?isCrossOriginPreload=false&isCrossOriginResource=false">
<title>The referrerpolicy attribute on Link header should be ignored for subresources</title>
<meta name="timeout" content="long">
<script src="resources/dummy.js?link-header-preload2"></script>
<script src="/common/get-host-info.sub.js"></script>
<script src="/common/utils.js"></script>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/preload/resources/preload_helper.js"></script>
<body>
    <p>The referrerpolicy attribute on Link header should be ignored for subresources
    to prevent cross-origin referrer leakage</p>
<script>
window.referrers = {};
const {REMOTE_ORIGIN} = get_host_info();
async function loader(t, {preloadPolicy, resourcePolicy, isCrossOriginResource, hrefUrl, hrefParams}) {
    const img = document.createElement('img');
    const params = new URLSearchParams();
    params.set('href', `${hrefUrl}?${hrefParams.toString()}`);
    if (preloadPolicy === '')
        params.set('preload-policy', '');
    else
        params.set('preload-policy', `referrerpolicy=${preloadPolicy}`);
    params.set('resource-name', 'green.png');
    img.src = `${isCrossOriginResource ? REMOTE_ORIGIN : location.origin}/preload/resources/link-header-referrer-policy.py?${params.toString()}`;
    img.referrerPolicy = resourcePolicy;
    const preloaded = new Promise(resolve => img.addEventListener('load', resolve));
    t.add_cleanup(() => img.remove());
    document.body.appendChild(img);
    await preloaded;
    hrefParams.set('operation', 'take');
    const take_href = `${hrefUrl}?${hrefParams.toString()}`;
    let actualReferrer;
    for (let i = 0; i < 10; ++i) {
        actualReferrer = await fetch(take_href).then(res => res.text());
        if (actualReferrer === '') {
            // Preload request has not yet been received. Retry after timeout.
            await new Promise(resolve => t.step_timeout(resolve, 100));
        } else {
            break;
        }
    }
    return {actualReferrer, unsafe: img.src};
};

function test_referrer_policy(preloadPolicy, resourcePolicy, isCrossOriginPreload, isCrossOriginResource) {
    promise_test(async t => {
        const id = token();
        const hrefUrl = `${isCrossOriginPreload ? REMOTE_ORIGIN : location.origin}/preload/resources/stash-referrer.py`;
        const hrefParams = new URLSearchParams();
        hrefParams.set('key', id);
        hrefParams.set('operation', 'put');
        const {actualReferrer, unsafe} = await loader(t, {preloadPolicy, resourcePolicy, isCrossOriginResource, hrefUrl, hrefParams})
        assert_equals(actualReferrer, 'NO-REFERER');
    }, `referrer policy (${preloadPolicy} -> ${resourcePolicy}, ${isCrossOriginPreload ? 'cross-origin' : 'same-origin'}, ${isCrossOriginResource ? 'cross-origin' : 'same-origin'})`)
}
const policies = [
"",
"no-referrer",
"same-origin",
"origin",
"origin-when-cross-origin",
"strict-origin-when-cross-origin",
"unsafe-url"]

const params = new URLSearchParams(location.search);
const isCrossOriginPreload = params.get('isCrossOriginPreload') === 'true';
const isCrossOriginResource = params.get('isCrossOriginResource') === 'true';
for (const preloadPolicy of policies) {
    for (const resourcePolicy of policies) {
        test_referrer_policy(
            preloadPolicy,
            resourcePolicy,
            isCrossOriginPreload,
            isCrossOriginResource);
    }
}

</script>
</body>