tree: d3a4b20218aa491734b8a82ceeb6e680f12983b2 [path history] [tgz]
  1. experimental-features/
  2. reporting/
  3. resources/
  4. bluetooth-allowed-by-permissions-policy-attribute-redirect-on-load.https.sub.html
  5. bluetooth-allowed-by-permissions-policy-attribute.https.sub.html
  6. bluetooth-allowed-by-permissions-policy.https.sub.html
  7. bluetooth-allowed-by-permissions-policy.https.sub.html.headers
  8. bluetooth-default-permissions-policy.https.sub.html
  9. bluetooth-disabled-by-permissions-policy.https.sub.html
  10. bluetooth-disabled-by-permissions-policy.https.sub.html.headers
  11. idlharness.window.js
  12. META.yml
  13. payment-allowed-by-permissions-policy-attribute-redirect-on-load.https.sub.html
  14. payment-allowed-by-permissions-policy-attribute.https.sub.html
  15. payment-allowed-by-permissions-policy.https.sub.html
  16. payment-allowed-by-permissions-policy.https.sub.html.headers
  17. payment-default-permissions-policy.https.sub.html
  18. payment-disabled-by-permissions-policy.https.sub.html
  19. payment-disabled-by-permissions-policy.https.sub.html.headers
  20. payment-extension-allowed-by-permissions-policy-attribute.https.sub.html
  21. payment-supported-by-permissions-policy.tentative.html
  22. permissions-policy-frame-policy-allowed-for-all.https.sub.html
  23. permissions-policy-frame-policy-allowed-for-all.https.sub.html.sub.headers
  24. permissions-policy-frame-policy-allowed-for-self.https.sub.html
  25. permissions-policy-frame-policy-allowed-for-self.https.sub.html.sub.headers
  26. permissions-policy-frame-policy-allowed-for-some-override.https.sub.html
  27. permissions-policy-frame-policy-allowed-for-some-override.https.sub.html.sub.headers
  28. permissions-policy-frame-policy-allowed-for-some.https.sub.html
  29. permissions-policy-frame-policy-allowed-for-some.https.sub.html.sub.headers
  30. permissions-policy-frame-policy-disallowed-for-all.https.sub.html
  31. permissions-policy-frame-policy-disallowed-for-all.https.sub.html.sub.headers
  32. permissions-policy-frame-policy-timing-iframe-camera.https.sub.html
  33. permissions-policy-frame-policy-timing.https.sub.html
  34. permissions-policy-header-policy-allowed-for-all.https.sub.html
  35. permissions-policy-header-policy-allowed-for-all.https.sub.html.sub.headers
  36. permissions-policy-header-policy-allowed-for-self.https.sub.html
  37. permissions-policy-header-policy-allowed-for-self.https.sub.html.sub.headers
  38. permissions-policy-header-policy-allowed-for-some.https.sub.html
  39. permissions-policy-header-policy-allowed-for-some.https.sub.html.sub.headers
  40. permissions-policy-header-policy-declined.https.sub.html
  41. permissions-policy-header-policy-declined.https.sub.html.sub.headers
  42. permissions-policy-header-policy-disallowed-for-all.https.sub.html
  43. permissions-policy-header-policy-disallowed-for-all.https.sub.html.sub.headers
  44. permissions-policy-javascript-url-frame-policy.https.html
  45. permissions-policy-nested-header-policy-allowed-for-all.https.sub.html
  46. permissions-policy-nested-header-policy-allowed-for-all.https.sub.html.sub.headers
  47. permissions-policy-nested-header-policy-allowed-for-self.https.sub.html
  48. permissions-policy-nested-header-policy-allowed-for-self.https.sub.html.sub.headers
  49. permissions-policy-nested-header-policy-disallowed-for-all.https.sub.html
  50. permissions-policy-nested-header-policy-disallowed-for-all.https.sub.html.sub.headers
  51. permissions-policy-opaque-origin-history.https.html
  52. permissions-policy-opaque-origin.https.html
  53. picture-in-picture-allowed-by-permissions-policy-attribute-redirect-on-load.https.sub.html
  54. picture-in-picture-allowed-by-permissions-policy-attribute.https.sub.html
  55. picture-in-picture-allowed-by-permissions-policy.https.sub.html
  56. picture-in-picture-allowed-by-permissions-policy.https.sub.html.headers
  57. picture-in-picture-default-permissions-policy.https.sub.html
  58. picture-in-picture-disabled-by-permissions-policy.https.sub.html
  59. picture-in-picture-disabled-by-permissions-policy.https.sub.html.headers
  60. picture-in-picture-supported-by-permissions-policy.html
  61. policy-extends-to-sandbox.html
  62. README.md
permissions-policy/README.md

Permissions Policy Guide

How to Test a New Feature with permissions policy

This directory contains a framework to test features with permissions policy.

When adding a new feature to permissions policy, the following cases should be tested:

  • feature enabled by header policy [HTTP tests]
    • test when feature is enabled by permissions policy HTTP header;
  • feature disabled by header policy [HTTP tests]
    • test when feature is disabled by permissions policy HTTP header;
  • feature enabled on self origin by header policy [HTTP tests]
    • test when feature is enabled only on self origin by permissions policy HTTP header.
  • feature allowed by container policy (iframe “allow” attribute);
    • test when feature is enabled by iframe “allow” attribute on self and cross origins.
  • feature allowed by container policy, redirect on load.
    • test when feature is enabled by iframe “allow” attribute when the iframe is being redirected to a new origin upon loading

How to Use the Test Framework

Use test_feature_availability() defined in /permissions-policy/resources/permissions-policy.js. Please refer to the comments in /permissions-policy/resources/permissions-policy.js for how this function works.

How to Write Header Policy Tests

HTTP tests are used to test features with header policy.

  • Define the header policy in <feature-name>-<enabled | disabled | enabled-on-self-origin>-by-permissions-policy.https.sub.html.headers. Example:

    Permissions-Policy: feature-name=*

  • In <feature-name>-<enabled | disabled | enabled-on-self-origin>-by-permissions-policy.https.sub.html:

  • test if feature is enabled / disabled in the main frame;

  • test if feature is enabled / disabled in a same-origin iframe;

  • test if feature is enabled / disabled in a cross-origin iframe.

Examples: /permissions-policy/payment-disabled-by-permissions-policy.https.sub.html /permissions-policy/payment-disabled-by-permissions-policy.https.sub.html.headers

How to Write Container Policy Tests

Simply use test_feature_availability() with the optional argument feature_name specified to test if:

  • feature is enabled / disabled in a same-origin iframe;
  • feature is enabled / disabled in a cross-origin iframe.

Example: /permissions-policy/payment-allowed-by-permissions-policy-attribute.https.sub.html

How to Write Container Policy Tests with Redirect

Similar to the section above, append /permissions-policy/resources/redirect-on-load.html# to the argument src passed to test_feature_availability().

Example: /permissions-policy/payment-allowed-by-permissions-policy-attribute-redirect-on-load.https.sub.html