blob: 77be8bb98f09bc825b35571a8630723327a8ff1f [file] [log] [blame]
// META: script=/common/utils.js
// META: script=resources/support.sub.js
//
// Spec: https://wicg.github.io/private-network-access/#integration-fetch
//
// These tests check that fetches from within `Worker` scripts are subject to
// Private Network Access checks, just like fetches from within documents.
//
// This file covers only those tests that must execute in a non-secure context.
// Other tests are defined in: worker-fetch.https.window.js
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTP_LOCAL },
target: { server: Server.HTTP_LOCAL },
expected: WorkerFetchTestResult.SUCCESS,
}), "local to local: success.");
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTP_PRIVATE },
target: {
server: Server.HTTP_LOCAL,
behavior: {
preflight: PreflightBehavior.success(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: WorkerFetchTestResult.FAILURE,
}), "private to local: failure.");
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTP_PRIVATE },
target: { server: Server.HTTP_PRIVATE },
expected: WorkerFetchTestResult.SUCCESS,
}), "private to private: success.");
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: {
server: Server.HTTP_LOCAL,
behavior: {
preflight: PreflightBehavior.success(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: WorkerFetchTestResult.FAILURE,
}), "public to local: failure.");
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: {
server: Server.HTTP_PRIVATE,
behavior: {
preflight: PreflightBehavior.success(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: WorkerFetchTestResult.FAILURE,
}), "public to private: failure.");
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTP_PUBLIC },
target: { server: Server.HTTP_PUBLIC },
expected: WorkerFetchTestResult.SUCCESS,
}), "public to public: success.");
promise_test(t => workerFetchTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: {
server: Server.HTTP_LOCAL,
behavior: { preflight: PreflightBehavior.success(token()) },
},
expected: WorkerFetchTestResult.FAILURE,
}), "treat-as-public to local: failure.");
promise_test(t => workerFetchTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: {
server: Server.HTTP_PRIVATE,
behavior: {
preflight: PreflightBehavior.success(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: WorkerFetchTestResult.FAILURE,
}), "treat-as-public to private: failure.");
promise_test(t => workerFetchTest(t, {
source: {
server: Server.HTTP_LOCAL,
treatAsPublic: true,
},
target: {
server: Server.HTTP_PUBLIC,
behavior: { response: ResponseBehavior.allowCrossOrigin() },
},
expected: WorkerFetchTestResult.SUCCESS,
}), "treat-as-public to public: success.");
// The following tests verify that workers served over HTTPS are not allowed to
// make private network requests because they are not secure contexts.
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTPS_PRIVATE },
target: {
server: Server.HTTP_LOCAL,
behavior: {
preflight: PreflightBehavior.success(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: WorkerFetchTestResult.FAILURE,
}), "private https to local: failure.");
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTPS_PUBLIC },
target: {
server: Server.HTTP_LOCAL,
behavior: {
preflight: PreflightBehavior.success(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: WorkerFetchTestResult.FAILURE,
}), "pubiic https to local: failure.");
promise_test(t => workerFetchTest(t, {
source: { server: Server.HTTPS_PUBLIC },
target: {
server: Server.HTTP_LOCAL,
behavior: {
preflight: PreflightBehavior.success(token()),
response: ResponseBehavior.allowCrossOrigin(),
},
},
expected: WorkerFetchTestResult.FAILURE,
}), "public https to local: failure.");