| // META: script=/common/dispatcher/dispatcher.js |
| // META: script=/common/utils.js |
| // META: script=resources/support.sub.js |
| // |
| // Spec: https://wicg.github.io/private-network-access/#integration-fetch |
| // |
| // These tests verify that non-secure contexts cannot navigate iframes to |
| // less-public address spaces, and can navigate them otherwise. |
| // |
| // This file covers only those tests that must execute in a non secure context. |
| // Other tests are defined in: iframe.tentative.https.window.js |
| |
| setup(() => { |
| // Making sure we are in a non secure context, as expected. |
| assert_false(window.isSecureContext); |
| }); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_LOCAL }, |
| target: { server: Server.HTTP_LOCAL }, |
| expected: FrameTestResult.SUCCESS, |
| }), "local to local: no preflight required."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_LOCAL }, |
| target: { server: Server.HTTP_PRIVATE }, |
| expected: FrameTestResult.SUCCESS, |
| }), "local to private: no preflight required."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_LOCAL }, |
| target: { server: Server.HTTP_PUBLIC }, |
| expected: FrameTestResult.SUCCESS, |
| }), "local to public: no preflight required."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_PRIVATE }, |
| target: { server: Server.HTTP_LOCAL }, |
| expected: FrameTestResult.FAILURE, |
| }), "private to local: failure."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_PRIVATE }, |
| target: { server: Server.HTTP_PRIVATE }, |
| expected: FrameTestResult.SUCCESS, |
| }), "private to private: no preflight required."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_PRIVATE }, |
| target: { server: Server.HTTP_PUBLIC }, |
| expected: FrameTestResult.SUCCESS, |
| }), "private to public: no preflight required."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_PUBLIC }, |
| target: { server: Server.HTTP_LOCAL }, |
| expected: FrameTestResult.FAILURE, |
| }), "public to local: failure."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_PUBLIC }, |
| target: { server: Server.HTTP_PRIVATE }, |
| expected: FrameTestResult.FAILURE, |
| }), "public to private: failure."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { server: Server.HTTP_PUBLIC }, |
| target: { server: Server.HTTP_PUBLIC }, |
| expected: FrameTestResult.SUCCESS, |
| }), "public to public: no preflight required."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { |
| server: Server.HTTP_LOCAL, |
| treatAsPublic: true, |
| }, |
| target: { server: Server.HTTP_LOCAL }, |
| expected: FrameTestResult.FAILURE, |
| }), "treat-as-public-address to local: failure."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { |
| server: Server.HTTP_LOCAL, |
| treatAsPublic: true, |
| }, |
| target: { server: Server.HTTP_PRIVATE }, |
| expected: FrameTestResult.FAILURE, |
| }), "treat-as-public-address to private: failure."); |
| |
| promise_test_parallel(t => iframeTest(t, { |
| source: { |
| server: Server.HTTP_LOCAL, |
| treatAsPublic: true, |
| }, |
| target: { server: Server.HTTP_PUBLIC }, |
| expected: FrameTestResult.SUCCESS, |
| }), "treat-as-public-address to public: no preflight required."); |
| |
| // The following test verifies that when a grandparent frame navigates its |
| // grandchild, the IP address space of the grandparent is compared against the |
| // IP address space of the response. Indeed, the navigation initiator in this |
| // case is the grandparent, not the parent. |
| |
| iframeGrandparentTest({ |
| name: "local to local, grandparent navigates: success.", |
| grandparentServer: Server.HTTP_LOCAL, |
| child: { server: Server.HTTP_PUBLIC }, |
| grandchild: { server: Server.HTTP_LOCAL }, |
| expected: FrameTestResult.SUCCESS, |
| }); |