| // META: script=helpers.js |
| // META: script=/cookies/resources/cookie-helper.sub.js |
| // META: script=/resources/testdriver.js |
| // META: script=/resources/testdriver-vendor.js |
| 'use strict'; |
| |
| (async function() { |
| // These are cross-site from the current document. |
| const altWww = "https://{{hosts[alt][www]}}:{{ports[https][0]}}"; |
| const altRoot = "https://{{hosts[alt][]}}:{{ports[https][0]}}"; |
| const responderPath = "/storage-access-api/resources/script-with-cookie-header.py?script=embedded_responder.js"; |
| |
| const altRootResponder = `${altRoot}${responderPath}`; |
| const domainCookieString = "cookie=unpartitioned;Secure;SameSite=None;Path=/;Domain={{hosts[alt][]}}"; |
| |
| async function SetUpResponderFrame(t, url) { |
| const frame = await CreateFrame(url); |
| |
| await SetPermissionInFrame(frame, [{ name: 'storage-access' }, 'granted']); |
| t.add_cleanup(async () => { |
| await test_driver.delete_all_cookies(); |
| await SetPermissionInFrame(frame, [{ name: 'storage-access' }, 'prompt']); |
| await DeleteCookieInFrame(frame, "cookie", "Secure;SameSite=None;Path=/;Domain={{hosts[alt][]}}"); |
| }); |
| |
| return frame; |
| } |
| |
| promise_test(async (t) => { |
| const frame = await SetUpResponderFrame(t, altRootResponder); |
| await SetDocumentCookieFromFrame(frame, domainCookieString); |
| |
| const initiallyHasCookieAccess = |
| cookieStringHasCookie("cookie", "unpartitioned", |
| await FetchSubresourceCookiesFromFrame(frame, altWww)); |
| if (initiallyHasCookieAccess) { |
| // Nothing to test here; third-party cookies are already accessible. |
| return; |
| } |
| |
| assert_true(await RequestStorageAccessInFrame(frame), "requestStorageAccess resolves without requiring a gesture."); |
| assert_true(await FrameHasStorageAccess(frame), "frame has storage access after request."); |
| await SetDocumentCookieFromFrame(frame, domainCookieString); |
| assert_true(await HasUnpartitionedCookie(frame), "frame has access to cookies after request."); |
| |
| // The frame's origin is hosts[alt][], so hosts[alt][www] is same-site but |
| // cross-origin to it. |
| assert_false( |
| cookieStringHasCookie("cookie", "unpartitioned", |
| await FetchSubresourceCookiesFromFrame(frame, altWww)), |
| "same-site cross-origin fetch is not credentialed"); |
| }, "Cross-origin fetches from a frame with storage-access are not credentialed by default"); |
| |
| promise_test(async (t) => { |
| const frame = await SetUpResponderFrame(t, altRootResponder); |
| await SetDocumentCookieFromFrame(frame, domainCookieString); |
| |
| const initiallyHasCookieAccess = |
| cookieStringHasCookie("cookie", "unpartitioned", |
| await FetchSubresourceCookiesFromFrame(frame, altWww)); |
| if (initiallyHasCookieAccess) { |
| // Nothing to test here; third-party cookies are already accessible. |
| return; |
| } |
| |
| assert_true(await RequestStorageAccessInFrame(frame), "requestStorageAccess resolves without requiring a gesture."); |
| assert_true(await FrameHasStorageAccess(frame), "frame has storage access after request."); |
| await SetDocumentCookieFromFrame(frame, domainCookieString); |
| assert_true(await HasUnpartitionedCookie(frame), "frame has access to cookies after request."); |
| |
| // The frame's origin is hosts[alt][], so hosts[alt][www] is same-site but |
| // cross-origin to it. |
| const cross_origin_redirect = `${altRoot}/common/redirect.py?location=${altWww}/storage-access-api/resources/echo-cookie-header.py`; |
| assert_false( |
| cookieStringHasCookie("cookie", "unpartitioned", |
| await FetchFromFrame(frame, cross_origin_redirect)), |
| "fetch is not credentialed after a cross-origin redirect"); |
| }, "Cross-origin HTTP redirects from a frame with storage-access are not credentialed by default"); |
| |
| })(); |