blob: fd38f7cf70eb3909fe95fe68a43e74283be163e4 [file] [log] [blame]
// META: script=/common/utils.js
// META: script=resources/support.sub.js
//
// Spec: https://wicg.github.io/private-network-access/#integration-fetch
//
// These tests check that initial `Worker` script fetches are subject to Private
// Network Access checks, just like a regular `fetch()`. The main difference is
// that workers can only be fetched same-origin, so the only way to test this
// is using the `treat-as-public` CSP directive to artificially place the parent
// document in the `public` IP address space.
//
// This file covers only those tests that must execute in a secure context.
// Other tests are defined in: worker.window.js
promise_test(t => workerScriptTest(t, {
source: {
server: Server.HTTPS_LOCAL,
treatAsPublic: true,
},
target: { server: Server.HTTPS_LOCAL },
expected: WorkerScriptTestResult.FAILURE,
}), "treat-as-public to local: failed preflight.");
promise_test(t => workerScriptTest(t, {
source: {
server: Server.HTTPS_LOCAL,
treatAsPublic: true,
},
target: {
server: Server.HTTPS_LOCAL,
behavior: { preflight: PreflightBehavior.success(token()) },
},
expected: WorkerScriptTestResult.SUCCESS,
}), "treat-as-public to local: success.");
promise_test(t => workerScriptTest(t, {
source: {
server: Server.HTTPS_PRIVATE,
treatAsPublic: true,
},
target: { server: Server.HTTPS_PRIVATE },
expected: WorkerScriptTestResult.FAILURE,
}), "treat-as-public to private: failed preflight.");
promise_test(t => workerScriptTest(t, {
source: {
server: Server.HTTPS_PRIVATE,
treatAsPublic: true,
},
target: {
server: Server.HTTPS_PRIVATE,
behavior: { preflight: PreflightBehavior.success(token()) },
},
expected: WorkerScriptTestResult.SUCCESS,
}), "treat-as-public to private: success.");
promise_test(t => workerScriptTest(t, {
source: { server: Server.HTTPS_PUBLIC },
target: { server: Server.HTTPS_PUBLIC },
expected: WorkerScriptTestResult.SUCCESS,
}), "public to public: success.");