Source code
Revision control
Copy as Markdown
Other Tools
Test Info: Warnings
- This test has a WPT meta file that expects 1 subtest issues.
- This WPT test may be referenced by the following Test IDs:
- /reporting/same-origin-cross-site-credentials.https.sub.html - WPT Dashboard Interop Dashboard
<!DOCTYPE HTML>
<html>
<head>
<title>Test that credentials are sent properly in a same-origin but not same-site context</title>
<script src='/resources/testharness.js'></script>
<script src='/resources/testharnessreport.js'></script>
<script src='resources/report-helper.js'></script>
</head>
<body>
<script>
const base_url = `${location.protocol}//${location.host}`;
const endpoint = `${base_url}/reporting/resources/report.py`;
const id = '44b17b0d-1041-5640-acc5-4321844b47e4';
promise_test(async t => {
// If this is not run from the expected origin, then the A->B->A frame embedding will not be correct,
// and the cookies set in the top-level page will never be returned with the reports.
"Test running on unexpected origin; subsequent assertions will fail.");
// Set credentials, and set up test to clear them afterwards.
await fetch('/cookies/resources/setSameSite.py?reporting', {mode: 'no-cors', credentials: 'include', cache: 'no-store'});
t.add_cleanup(() => fetch("/cookies/resources/dropSameSite.py", {mode: 'no-cors', credentials: 'include', cache: 'no-store'}));
// Insert a cross-origin frame which will then frame this origin to
// trigger a CSP error.
const frame = document.createElement('iframe');
frame.src = `https://{{hosts[alt][]}}:{{ports[https][0]}}/reporting/resources/middle-frame.https.sub.html?reportID=${id}`;
document.body.appendChild(frame);
// Wait for the inner frame to signal that the report has been generated.
await new Promise(resolve => {
window.addEventListener('message', ev => {
if (ev.data === "done")
resolve(ev.data);
});
document.body.appendChild(frame);
});
const reports = await pollReports(endpoint, id);
checkReportExists(reports, 'csp-violation',
// Same-site: None cookies should be sent, but not Lax, Strict, or default cookies.
const cookies = await pollCookies(endpoint, id);
assert_equals(cookies.samesite_none, "[samesite_none=reporting]", "Credential value was correct");
assert_false("samesite_strict" in cookies, "Same-site: Strict cookies should not be sent");
assert_false("samesite_lax" in cookies, "Same-site: Lax cookies should not be sent");
assert_false("samesite_unspecified" in cookies, "Same-site unspecified cookies should not be sent");
assert_equals(Object.keys(cookies).length, 1, "No additional cookies were received");
}, "Reporting endpoints received credentials.");
</script>
</body>
</html>