| // META: script=/common/utils.js |
| // META: script=resources/support.sub.js |
| // |
| // Spec: https://wicg.github.io/private-network-access/#integration-fetch |
| // |
| // These tests verify that non-secure contexts cannot fetch subresources from |
| // less-public address spaces, and can fetch them otherwise. |
| // |
| // This file covers only those tests that must execute in a non secure context. |
| // Other tests are defined in: fetch.https.window.js |
| |
| setup(() => { |
| // Making sure we are in a non secure context, as expected. |
| assert_false(window.isSecureContext); |
| }); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_LOCAL }, |
| target: { server: Server.HTTP_LOCAL }, |
| expected: FetchTestResult.SUCCESS, |
| }), "local to local: no preflight required."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_LOCAL }, |
| target: { |
| server: Server.HTTP_PRIVATE, |
| behavior: { response: ResponseBehavior.allowCrossOrigin() }, |
| }, |
| expected: FetchTestResult.SUCCESS, |
| }), "local to private: no preflight required."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_LOCAL }, |
| target: { |
| server: Server.HTTP_PUBLIC, |
| behavior: { response: ResponseBehavior.allowCrossOrigin() }, |
| }, |
| expected: FetchTestResult.SUCCESS, |
| }), "local to public: no preflight required."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_PRIVATE }, |
| target: { |
| server: Server.HTTP_LOCAL, |
| behavior: { |
| preflight: PreflightBehavior.optionalSuccess(token()), |
| response: ResponseBehavior.allowCrossOrigin(), |
| }, |
| }, |
| expected: FetchTestResult.FAILURE, |
| }), "private to local: failure."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_PRIVATE }, |
| target: { server: Server.HTTP_PRIVATE }, |
| expected: FetchTestResult.SUCCESS, |
| }), "private to private: no preflight required."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_PRIVATE }, |
| target: { |
| server: Server.HTTP_PUBLIC, |
| behavior: { response: ResponseBehavior.allowCrossOrigin() }, |
| }, |
| expected: FetchTestResult.SUCCESS, |
| }), "private to public: no preflight required."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_PUBLIC }, |
| target: { |
| server: Server.HTTP_LOCAL, |
| behavior: { |
| preflight: PreflightBehavior.optionalSuccess(token()), |
| response: ResponseBehavior.allowCrossOrigin(), |
| }, |
| }, |
| expected: FetchTestResult.FAILURE, |
| }), "public to local: failure."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_PUBLIC }, |
| target: { |
| server: Server.HTTP_PRIVATE, |
| behavior: { |
| preflight: PreflightBehavior.optionalSuccess(token()), |
| response: ResponseBehavior.allowCrossOrigin(), |
| }, |
| }, |
| expected: FetchTestResult.FAILURE, |
| }), "public to private: failure."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTP_PUBLIC }, |
| target: { server: Server.HTTP_PUBLIC }, |
| expected: FetchTestResult.SUCCESS, |
| }), "public to public: no preflight required."); |
| |
| // These tests verify that documents fetched from the `local` address space yet |
| // carrying the `treat-as-public-address` CSP directive are treated as if they |
| // had been fetched from the `public` address space. |
| |
| promise_test(t => fetchTest(t, { |
| source: { |
| server: Server.HTTP_LOCAL, |
| treatAsPublic: true, |
| }, |
| target: { |
| server: Server.HTTP_LOCAL, |
| behavior: { |
| preflight: PreflightBehavior.success(token()), |
| response: ResponseBehavior.allowCrossOrigin(), |
| }, |
| }, |
| expected: FetchTestResult.FAILURE, |
| }), "treat-as-public-address to local: failure."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { |
| server: Server.HTTP_LOCAL, |
| treatAsPublic: true, |
| }, |
| target: { |
| server: Server.HTTP_PRIVATE, |
| behavior: { |
| preflight: PreflightBehavior.success(token()), |
| response: ResponseBehavior.allowCrossOrigin(), |
| }, |
| }, |
| expected: FetchTestResult.FAILURE, |
| }), "treat-as-public-address to private: failure."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { |
| server: Server.HTTP_LOCAL, |
| treatAsPublic: true, |
| }, |
| target: { |
| server: Server.HTTP_PUBLIC, |
| behavior: { response: ResponseBehavior.allowCrossOrigin() }, |
| }, |
| expected: FetchTestResult.SUCCESS, |
| }), "treat-as-public-address to public: no preflight required."); |
| |
| // These tests verify that HTTPS iframes embedded in an HTTP top-level document |
| // cannot fetch subresources from less-public address spaces. Indeed, even |
| // though the iframes have HTTPS origins, they are non-secure contexts because |
| // their parent is a non-secure context. |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTPS_PRIVATE }, |
| target: { |
| server: Server.HTTPS_LOCAL, |
| behavior: { |
| preflight: PreflightBehavior.success(token()), |
| response: ResponseBehavior.allowCrossOrigin(), |
| }, |
| }, |
| expected: FetchTestResult.FAILURE, |
| }), "private https to local: failure."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTPS_PUBLIC }, |
| target: { |
| server: Server.HTTPS_LOCAL, |
| behavior: { |
| preflight: PreflightBehavior.success(token()), |
| response: ResponseBehavior.allowCrossOrigin(), |
| }, |
| }, |
| expected: FetchTestResult.FAILURE, |
| }), "public https to local: failure."); |
| |
| promise_test(t => fetchTest(t, { |
| source: { server: Server.HTTPS_PUBLIC }, |
| target: { |
| server: Server.HTTPS_PRIVATE, |
| behavior: { |
| preflight: PreflightBehavior.success(token()), |
| response: ResponseBehavior.allowCrossOrigin(), |
| }, |
| }, |
| expected: FetchTestResult.FAILURE, |
| }), "public https to private: failure."); |