Closed Bug 1813158 Opened 1 year ago Closed 1 year ago

[wpt-sync] Sync PR 38226 - [rsafor] Add renderer check for insecure contexts

Categories

(Testing :: web-platform-tests, task, P4)

task

Tracking

(firefox111 fixed)

RESOLVED FIXED
111 Branch
Tracking Status
firefox111 --- fixed

People

(Reporter: mozilla.org, Unassigned)

References

()

Details

(Whiteboard: [wptsync downstream])

Sync web-platform-tests PR 38226 into mozilla-central (this bug is closed when the sync is complete).

PR: https://github.com/web-platform-tests/wpt/pull/38226
Details from upstream follow.

Matt Reichhoff <mreichhoff@chromium.org> wrote:

[rsafor] Add renderer check for insecure contexts

See https://github.com/privacycg/requestStorageAccessForOrigin/pull/19

Bug: 1410556
Change-Id: I7be8d0fb30ecc9979755e9dfc35756f05555d8ca
Reviewed-on: https://chromium-review.googlesource.com/4197659
WPT-Export-Revision: 3a6b273cfdbdde0676f01cf06dcd65f9b2a10e56

PR 38226 applied with additional changes from upstream: a4c4d5db396fc05bac86aef3819a1c46e89fb1c6

CI Results

Ran 9 Firefox configurations based on mozilla-central, and Firefox, Chrome, and Safari on GitHub CI

Total 2 tests and 9 subtests

Status Summary

Firefox

OK : 2
FAIL: 16

Chrome

OK : 2
FAIL: 16

Safari

OK : 2
FAIL: 16

Links

Gecko CI (Treeherder)
GitHub PR Head
GitHub PR Base

Details

New Tests That Don't Pass

  • /top-level-storage-access-api/tentative/requestStorageAccessForOrigin-insecure.sub.window.html [wpt.fyi]
    • [insecure-context] document.requestStorageAccessForOrigin() should be supported on the document interface: FAIL (Chrome: FAIL, Safari: FAIL)
    • [insecure-context] document.requestStorageAccessForOrigin() should be rejected by default with no user gesture: FAIL (Chrome: FAIL, Safari: FAIL)
    • [non-fully-active] document.requestStorageAccessForOrigin() should not resolve when run in a detached frame: FAIL (Chrome: FAIL, Safari: FAIL)
    • [non-fully-active] document.requestStorageAccessForOrigin() should not resolve when run in a detached DOMParser document: FAIL (Chrome: FAIL, Safari: FAIL)
    • [insecure-context] document.requestStorageAccessForOrigin() should be rejected when called in an insecure context: FAIL (Chrome: FAIL, Safari: FAIL)
    • [secure-frame-on-insecure-page] document.requestStorageAccessForOrigin() should be supported on the document interface: FAIL (Chrome: FAIL, Safari: FAIL)
    • [secure-frame-on-insecure-page] document.requestStorageAccessForOrigin() should be rejected when called in an iframe: FAIL (Chrome: FAIL, Safari: FAIL)
  • /top-level-storage-access-api/tentative/requestStorageAccessForOrigin.sub.https.window.html [wpt.fyi]
    • [top-level-context] document.requestStorageAccessForOrigin() should be supported on the document interface: FAIL (Chrome: FAIL, Safari: FAIL)
    • [top-level-context] document.requestStorageAccessForOrigin() should be rejected by default with no user gesture: FAIL (Chrome: FAIL, Safari: FAIL)
    • [non-fully-active] document.requestStorageAccessForOrigin() should not resolve when run in a detached frame: FAIL (Chrome: FAIL, Safari: FAIL)
    • [non-fully-active] document.requestStorageAccessForOrigin() should not resolve when run in a detached DOMParser document: FAIL (Chrome: FAIL, Safari: FAIL)
    • [top-level-context] document.requestStorageAccessForOrigin() should be resolved when called properly with a user gesture and the same site: FAIL (Chrome: FAIL, Safari: FAIL)
    • [top-level-context] document.requestStorageAccessForOrigin() should be rejected when called with an invalid site: FAIL (Chrome: FAIL, Safari: FAIL)
    • [top-level-context] document.requestStorageAccessForOrigin() should be rejected when called with an opaque origin: FAIL (Chrome: FAIL, Safari: FAIL)
    • [same-origin-frame] document.requestStorageAccessForOrigin() should be supported on the document interface: FAIL (Chrome: FAIL, Safari: FAIL)
    • [same-origin-frame] document.requestStorageAccessForOrigin() should be rejected when called in an iframe: FAIL (Chrome: FAIL, Safari: FAIL)
Pushed by wptsync@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/20f3f3ca808c
[wpt PR 38226] - [rsafor] Add renderer check for insecure contexts, a=testonly
https://hg.mozilla.org/integration/autoland/rev/b37a2727eee7
[wpt PR 38226] - Update wpt metadata, a=testonly
Status: NEW → RESOLVED
Closed: 1 year ago
Resolution: --- → FIXED
Target Milestone: --- → 111 Branch
You need to log in before you can comment on or make changes to this bug.