Source code

Revision control

Copy as Markdown

Other Tools

Test Info:

// META: script=/common/utils.js
// META: script=resources/support.sub.js
//
//
// These tests mirror fetch.window.js, but use `XmlHttpRequest` instead of
// `fetch()` to perform subresource fetches.
//
// This file covers only those tests that must execute in a non secure context.
// Other tests are defined in: xhr.https.window.js
setup(() => {
// Making sure we are in a non secure context, as expected.
assert_false(window.isSecureContext);
});
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_LOCAL },
target: { server: Server.HTTP_LOCAL },
expected: XhrTestResult.SUCCESS,
}), "local to local: no preflight required.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_LOCAL },
target: {
server: Server.HTTP_PRIVATE,
behavior: { response: ResponseBehavior.allowCrossOrigin() },
},
expected: XhrTestResult.SUCCESS,
}), "local to private: no preflight required.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_LOCAL },
target: {
server: Server.HTTP_PUBLIC,
behavior: { response: ResponseBehavior.allowCrossOrigin() },
},
expected: XhrTestResult.SUCCESS,
}), "local to public: no preflight required.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_PRIVATE },
target: {
server: Server.HTTP_LOCAL,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.FAILURE,
}), "private to local: failure.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_PRIVATE },
target: { server: Server.HTTP_PRIVATE },
expected: XhrTestResult.SUCCESS,
}), "private to private: no preflight required.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_PRIVATE },
target: {
server: Server.HTTP_PUBLIC,
behavior: { response: ResponseBehavior.allowCrossOrigin() },
},
expected: XhrTestResult.SUCCESS,
}), "private to public: no preflight required.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: {
server: Server.HTTP_LOCAL,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.FAILURE,
}), "public to local: failure.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: {
server: Server.HTTP_PRIVATE,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.FAILURE,
}), "public to private: failure.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: { server: Server.HTTP_PUBLIC },
expected: XhrTestResult.SUCCESS,
}), "public to public: no preflight required.");
// These tests verify that documents fetched from the `local` address space yet
// carrying the `treat-as-public-address` CSP directive are treated as if they
// had been fetched from the `public` address space.
promise_test(t => xhrTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: {
server: Server.HTTP_LOCAL,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.FAILURE,
}), "treat-as-public-address to local: failure.");
promise_test(t => xhrTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: {
server: Server.HTTP_PRIVATE,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.FAILURE,
}), "treat-as-public-address to private: failure.");
promise_test(t => xhrTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: {
server: Server.HTTP_PUBLIC,
behavior: { response: ResponseBehavior.allowCrossOrigin() },
},
expected: XhrTestResult.SUCCESS,
}), "treat-as-public-address to public: no preflight required.");
// These tests verify that HTTPS iframes embedded in an HTTP top-level document
// cannot fetch subresources from less-public address spaces. Indeed, even
// though the iframes have HTTPS origins, they are non-secure contexts because
// their parent is a non-secure context.
promise_test(t => xhrTest(t, {
source: { server: Server.HTTPS_LOCAL },
target: {
server: Server.HTTPS_LOCAL,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.SUCCESS,
}), "local https to local: success.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTPS_PRIVATE },
target: {
server: Server.HTTPS_LOCAL,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.FAILURE,
}), "private https to local: failure.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTPS_PUBLIC },
target: {
server: Server.HTTPS_LOCAL,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.FAILURE,
}), "public https to local: failure.");
promise_test(t => xhrTest(t, {
source: { server: Server.HTTPS_PUBLIC },
target: {
server: Server.HTTPS_PRIVATE,
behavior: {
preflight: PreflightBehavior.optionalSuccess(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: XhrTestResult.FAILURE,
}), "public https to private: failure.");