tree: 79aecb24c454c659f33575d92ac45d36691d25d0 [path history] [tgz]
  1. experimental-features/
  2. reporting/
  3. resources/
  4. DIR_METADATA
  5. idlharness.window-expected.txt
  6. idlharness.window.js
  7. META.yml
  8. OWNERS
  9. payment-allowed-by-permissions-policy-attribute-redirect-on-load.https.sub.html
  10. payment-allowed-by-permissions-policy-attribute.https.sub.html
  11. payment-allowed-by-permissions-policy.https.sub.html
  12. payment-allowed-by-permissions-policy.https.sub.html.headers
  13. payment-default-permissions-policy.https.sub.html
  14. payment-disabled-by-permissions-policy.https.sub.html
  15. payment-disabled-by-permissions-policy.https.sub.html.headers
  16. payment-supported-by-permissions-policy.tentative.html
  17. permissions-policy-frame-policy-allowed-for-all.https.sub.html
  18. permissions-policy-frame-policy-allowed-for-all.https.sub.html.sub.headers
  19. permissions-policy-frame-policy-allowed-for-self.https.sub-expected.txt
  20. permissions-policy-frame-policy-allowed-for-self.https.sub.html
  21. permissions-policy-frame-policy-allowed-for-self.https.sub.html.sub.headers
  22. permissions-policy-frame-policy-allowed-for-some-override.https.sub-expected.txt
  23. permissions-policy-frame-policy-allowed-for-some-override.https.sub.html
  24. permissions-policy-frame-policy-allowed-for-some-override.https.sub.html.sub.headers
  25. permissions-policy-frame-policy-allowed-for-some.https.sub-expected.txt
  26. permissions-policy-frame-policy-allowed-for-some.https.sub.html
  27. permissions-policy-frame-policy-allowed-for-some.https.sub.html.sub.headers
  28. permissions-policy-frame-policy-disallowed-for-all.https.sub.html
  29. permissions-policy-frame-policy-disallowed-for-all.https.sub.html.sub.headers
  30. permissions-policy-frame-policy-timing-iframe-camera.https.sub.html
  31. permissions-policy-frame-policy-timing.https.sub.html
  32. permissions-policy-header-policy-allowed-for-all.https.sub.html
  33. permissions-policy-header-policy-allowed-for-all.https.sub.html.sub.headers
  34. permissions-policy-header-policy-allowed-for-self.https.sub.html
  35. permissions-policy-header-policy-allowed-for-self.https.sub.html.sub.headers
  36. permissions-policy-header-policy-allowed-for-some.https.sub.html
  37. permissions-policy-header-policy-allowed-for-some.https.sub.html.sub.headers
  38. permissions-policy-header-policy-declined.https.sub.html
  39. permissions-policy-header-policy-declined.https.sub.html.sub.headers
  40. permissions-policy-header-policy-disallowed-for-all.https.sub.html
  41. permissions-policy-header-policy-disallowed-for-all.https.sub.html.sub.headers
  42. permissions-policy-javascript-url-frame-policy.https.html
  43. permissions-policy-nested-header-policy-allowed-for-all.https.sub.html
  44. permissions-policy-nested-header-policy-allowed-for-all.https.sub.html.sub.headers
  45. permissions-policy-nested-header-policy-allowed-for-self.https.sub.html
  46. permissions-policy-nested-header-policy-allowed-for-self.https.sub.html.sub.headers
  47. permissions-policy-nested-header-policy-disallowed-for-all.https.sub.html
  48. permissions-policy-nested-header-policy-disallowed-for-all.https.sub.html.sub.headers
  49. permissions-policy-opaque-origin-history.https.html
  50. permissions-policy-opaque-origin.https.html
  51. picture-in-picture-allowed-by-permissions-policy-attribute-redirect-on-load.https.sub.html
  52. picture-in-picture-allowed-by-permissions-policy-attribute.https.sub.html
  53. picture-in-picture-allowed-by-permissions-policy.https.sub.html
  54. picture-in-picture-allowed-by-permissions-policy.https.sub.html.headers
  55. picture-in-picture-default-permissions-policy.https.sub.html
  56. picture-in-picture-disabled-by-permissions-policy.https.sub.html
  57. picture-in-picture-disabled-by-permissions-policy.https.sub.html.headers
  58. picture-in-picture-supported-by-permissions-policy.html
  59. policy-extends-to-sandbox.html
  60. README.md
chromium/src/third_party/blink/web_tests/external/wpt/permissions-policy/README.md

Permissions Policy Guide

How to Test a New Feature with permissions policy

This directory contains a framework to test features with permissions policy.

When adding a new feature to permissions policy, the following cases should be tested:

  • feature enabled by header policy [HTTP tests]
    • test when feature is enabled by permissions policy HTTP header;
  • feature disabled by header policy [HTTP tests]
    • test when feature is disabled by permissions policy HTTP header;
  • feature enabled on self origin by header policy [HTTP tests]
    • test when feature is enabled only on self origin by permissions policy HTTP header.
  • feature allowed by container policy (iframe “allow” attribute);
    • test when feature is enabled by iframe “allow” attribute on self and cross origins.
  • feature allowed by container policy, redirect on load.
    • test when feature is enabled by iframe “allow” attribute when the iframe is being redirected to a new origin upon loading

How to Use the Test Framework

Use test_feature_availability() defined in /permissions-policy/resources/permissions-policy.js. Please refer to the comments in /permissions-policy/resources/permissions-policy.js for how this function works.

How to Write Header Policy Tests

HTTP tests are used to test features with header policy.

  • Define the header policy in <feature-name>-<enabled | disabled | enabled-on-self-origin>-by-permissions-policy.https.sub.html.headers. Example:

    Permissions-Policy: feature-name=*

  • In <feature-name>-<enabled | disabled | enabled-on-self-origin>-by-permissions-policy.https.sub.html:

  • test if feature is enabled / disabled in the main frame;

  • test if feature is enabled / disabled in a same-origin iframe;

  • test if feature is enabled / disabled in a cross-origin iframe.

Examples: /permissions-policy/payment-disabled-by-permissions-policy.https.sub.html /permissions-policy/payment-disabled-by-permissions-policy.https.sub.html.headers

How to Write Container Policy Tests

Simply use test_feature_availability() with the optional argument feature_name specified to test if:

  • feature is enabled / disabled in a same-origin iframe;
  • feature is enabled / disabled in a cross-origin iframe.

Example: /permissions-policy/payment-allowed-by-permissions-policy-attribute.https.sub.html

How to Write Container Policy Tests with Redirect

Similar to the section above, append /permissions-policy/resources/redirect-on-load.html# to the argument src passed to test_feature_availability().

Example: /permissions-policy/payment-allowed-by-permissions-policy-attribute-redirect-on-load.https.sub.html