20 KiB
This directory contains the common infrastructure for the following tests (also referred below as projects).
- referrer-policy/
- mixed-content/
- upgrade-insecure-requests/
Subdirectories:
resources: Serves JavaScript test helpers.subresource: Serves subresources, with support for redirects, stash, etc. The subresource paths are managed bysubresourceMapand fetched inrequestVia*()functions inresources/common.js.scope: Serves nested contexts, such as iframe documents or workers. Used frominvokeFrom*()functions inresources/common.js.tools: Scripts that generate test HTML files. Not used while running tests./referrer-policy/generic/subresource-test: Sanity checking tests for subresource invocation (This is still placed outside common/)
Test generator
The test generator (common/security-features/tools/generate.py) generates test HTML files from templates and a seed (spec.src.json) that defines all the test scenarios.
The project (i.e. a WPT subdirectory, for example referrer-policy/) that uses the generator should define per-project data and invoke the common generator logic in common/security-features/tools.
This is the overview of the project structure:
common/security-features/
└── tools/ - the common test generator logic
├── spec.src.json
└── template/ - the test files templates
project-directory/ (e.g. referrer-policy/)
├── spec.src.json
├── generic/
│ ├── test-case.sub.js - Per-project test helper
│ ├── sanity-checker.js (Used by debug target only)
│ └── spec_json.js (Used by debug target only)
└── gen/ - generated tests
Generating the tests
Note: When the repository already contains generated tests, remove all generated tests first.
# Install json5 module if needed.
pip install --user json5
# Generate the test files under gen/ (HTMLs and .headers files).
path/to/common/security-features/tools/generate.py --spec path/to/project-directory/
# Add all generated tests to the repo.
git add path/to/project-directory/gen/ && git commit -m "Add generated tests"
This will parse the spec JSON5 files and determine which tests to generate (or skip) while using templates.
- The default spec JSON5:
common/security-features/tools/spec.src.json.- Describes common configurations, such as subresource types, source context types, etc.
- The per-project spec JSON5:
project-directory/spec.src.json.- Describes project-specific configurations, particularly those related to test generation patterns (
specification), policy deliveries (e.g.delivery_type,delivery_value) andexpectation.
- Describes project-specific configurations, particularly those related to test generation patterns (
For how these two spec JSON5 files are merged, see Sub projects section.
Note: spec.src.json is transitioning to JSON5 #21710.
During the generation, the spec is validated by common/security-features/tools/spec_validator.py. This is specially important when you're making changes to spec.src.json. Make sure it's a valid JSON (no comments or trailing commas). The validator reports specific errors (missing keys etc.), if any.
Removing all generated tests
Simply remove all files under project-directory/gen/.
rm -r path/to/project-directory/gen/
Options for generating tests
Note: this section is currently obsolete. Only the release template is working.
The generator script has two targets: release and debug.
-
Using release for the target will produce tests using a template for optimizing size and performance. The release template is intended for the official web-platform-tests and possibly other test suites. No sanity checking is done in release mode. Use this option whenever you're checking into web-platform-tests.
-
When generating for
debug, the produced tests will contain more verbosity and sanity checks. Use this target to identify problems with the test suites when making changes locally. Make sure you don't check in tests generated with the debug target.
Note that release is the default target when invoking generate.py.
Sub projects
Projects can be nested, for example to reuse a single spec.src.json across similar but slightly different sets of generated tests.
The directory structure would look like:
project-directory/ (e.g. referrer-policy/)
├── spec.src.json - Parent project's spec JSON
├── generic/
│ └── test-case.sub.js - Parent project's test helper
├── gen/ - parent project's generated tests
└── sub-project-directory/ (e.g. 4K)
├── spec.src.json - Child project's spec JSON
├── generic/
│ └── test-case.sub.js - Child project's test helper
└── gen/ - child project's generated tests
generate.py --spec project-directory/sub-project-directory generates test files under project-directory/sub-project-directory/gen, based on project-directory/spec.src.json and project-directory/sub-project-directory/spec.src.json.
- The child project's
spec.src.jsonis merged into parent project'sspec.src.json.- Two spec JSON objects are merged recursively.
- If a same key exists in both objects, the child's value overwrites the parent's value.
- If both (child's and parent's) values are arrays, then the child's value is concatenated to the parent's value.
- For debugging,
generate.pydumps the merged spec JSON object asgeneric/debug-output.spec.src.json.
- The child project's generated tests include both of the parent and child project's
test-case.sub.js:<script src="project-directory/test-case.sub.js"></script> <script src="project-directory/sub-project-directory/test-case.sub.js"></script> <script> TestCase(...); </script>
Updating the tests
The main test logic lives in project-directory/generic/test-case.sub.js with helper functions defined in /common/security-features/resources/common.js so you should probably start there.
For updating the test suites you will most likely do a subset of the following:
-
Add a new subresource type:
- Add a new sub-resource python script to
/common/security-features/subresource/. - Add a sanity check test for a sub-resource to
referrer-policy/generic/subresource-test/. - Add a new entry to
subresourceMapin/common/security-features/resources/common.js. - Add a new entry to
valid_subresource_namesin/common/security-features/tools/spec_validator.py. - Add a new entry to
subresource_schemainspec.src.json. - Update
source_context_schemato specify in which source context the subresource can be used.
- Add a new sub-resource python script to
-
Add a new subresource redirection type
- TODO: to be documented. Example: https://github.com/web-platform-tests/wpt/pull/18939
-
Add a new subresource origin type
- TODO: to be documented. Example: https://github.com/web-platform-tests/wpt/pull/18940
-
Add a new source context (e.g. "module sharedworker global scope")
- TODO: to be documented. Example: https://github.com/web-platform-tests/wpt/pull/18904
-
Add a new source context list (e.g. "subresource request from a dedicated worker in a
<iframe srcdoc>")- TODO: to be documented.
-
Implement new or update existing assertions in
project-directory/generic/test-case.sub.js. -
Exclude or add some tests by updating
spec.src.jsontest expansions. -
Implement a new delivery method.
- TODO: to be documented. Currently the support for delivery methods are implemented in many places across
common/security-features/.
- TODO: to be documented. Currently the support for delivery methods are implemented in many places across
-
Regenerate the tests and MANIFEST.json
How the generator works
This section describes how spec.src.json is turned into scenario data in test HTML files which are then processed by JavaScript test helpers and server-side scripts, and describes the objects/types used in the process.
The spec JSON
spec.src.json is the input for the generator that defines what to generate. For examples of spec JSON files, see referrer-policy/spec.src.json or mixed-content/spec.src.json.
Main sections
-
specificationTop level requirements with description fields and a
test_expansionrule. This is closely mimicking the Referrer Policy specification structure. -
excluded_testsList of
test_expansionpatterns expanding into selections which get skipped when generating the tests (aka. blocklisting/suppressing) -
test_expansion_schemaProvides valid values for each field. Each test expansion can only contain fields and values defined by this schema (or
"*"values that indicate all the valid values defined this schema). -
subresource_schemaProvides metadata of subresources, e.g. supported delivery types for each subresource.
-
source_context_schemaProvides metadata of each single source context, e.g. supported delivery types and subresources that can be sent from the context.
-
source_context_list_schemaProvides possible nested combinations of source contexts. See SourceContexts Resolution section below for details.
Test Expansion Pattern Object
Test expansion patterns (test_expansions in specification section) define the combinations of test configurations (selections) to be generated.
Each field in a test expansion can be in one of the following formats:
-
Single match:
"value" -
Match any of:
["value1", "value2", ...] -
Match all:
"*"
The following fields have special meaning:
name: just ignored. (Previously this was used as a part of filenames but now this is merely a label for human and is never used by generator. This field might be removed in the future (https://github.com/web-platform-tests/wpt/issues/21708))expansion: if there is more than one pattern expanding into a same selection, the pattern appearing later in the spec JSON will overwrite a previously generated selection. To make clear this is intentional, set the value of theexpansionfield todefaultfor an expansion appearing earlier andoverridefor the one appearing later.
For example a test expansion pattern (taken from referrer-policy/spec.src.json, sorted/formatted for explanation):
{
"name": "insecure-protocol",
"expansion": "default",
"delivery_type": "*",
"delivery_value": "no-referrer-when-downgrade",
"source_context_list": "*",
"expectation": "stripped-referrer",
"origin": ["same-http", "cross-http"],
"redirection": "*",
"source_scheme": "http",
"subresource": "*"
}
means: "All combinations with all possible delivery_type, delivery_value=no-referrer-when-downgrade, all possible source_context_list, expectation=stripped-referrer, origin=same-http or cross-http, all possible redirection, source_scheme=http, and all possible subresource.
Selection Object
A selection is an object that defines a single test, with keys/values from test_expansion_schema.
A single test expansion pattern gets expanded into a list of selections as follows:
-
Expand each field's pattern (single, any of, or all) to list of allowed values (defined by the
test_expansion_schema) -
Permute - Recursively enumerate all selections across all fields
The following field has special meaning:
delivery_key: This doesn't exist in test expansion patterns, and instead is taken fromdelivery_keyfield of the spec JSON and added into selections. (TODO(https://github.com/web-platform-tests/wpt/issues/21708): probably this should be added to test expansion patterns to remove this special handling)
For example, the test expansion in the example above generates selections like the following selection (which eventually generates this test file):
{
"delivery_type": "http-rp",
"delivery_key": "referrerPolicy",
"delivery_value": "no-referrer-when-downgrade",
"source_context_list": "worker-classic",
"expectation": "stripped-referrer",
"origin": "same-http",
"redirection": "no-redirect",
"source_scheme": "http",
"subresource": "fetch"
}
Excluding Test Expansion Patterns
The excluded_tests section have objects with the same format as Test Expansion Patterns that define selections to be excluded.
Taking the spec JSON, the generator follows this algorithm:
-
Expand all
excluded_teststo create a denylist of selections -
For each
specificationentries: Expand thetest_expansionpattern into selections and check each against the denylist, if not marked as suppresed, generate the test resources for the selection
SourceContext Resolution
The source_context_list_schema section of spec.src.json defines templates of policy deliveries and source contexts.
The source_context_list value in a selection specifies the key of the template to be used in source_context_list_schema, and the following fields in the selection are filled into the template (these three values define the target policy delivery to be tested):
delivery_typedelivery_keydelivery_value
Source Context List Schema
Each entry of source_context_list_schema, defines a single template of how/what policies to be delivered in what source contexts (See also PolicyDelivery and SourceContext).
- The key: the name of the template which matches with the
source_context_listvalue in a selection. sourceContextList: an array ofSourceContextobjects that represents a (possibly nested) context.sourceContextTypeof the first entry ofsourceContextListshould be always"top", which represents the top-level generated test HTML. This entry is omitted in the scenario JSON object passed to JavaScript runtime, but the policy deliveries specified here are handled by the generator, e.g. written as<meta>elements in the generated test HTML.
subresourcePolicyDeliveries: an array ofPolicyDeliveryobjects that represents policies specified at subresource requests (e.g.referrerPolicyattribute of<img>elements).
PolicyDelivery placeholders
Instead to ordinal PolicyDelivery objects, the following placeholder strings can be used in sourceContextList or subresourcePolicyDeliveries.
"policy":- Replaced with the target policy delivery.
"policyIfNonNull":- Replaced with the target policy delivery, only if
delivery_valueis notnull. Ifdelivery_valueisnull, then the test is not generated.
- Replaced with the target policy delivery, only if
"anotherPolicy":- Replaced with a
PolicyDeliveryobject that has a different value from the target policy delivery. - Can be used to specify e.g. a policy that should be overridden by the target policy delivery.
- Replaced with a
source_context_schema and subresource_schema
These represent supported delivery types and subresources for each source context or subresource type. These are used
- To filter out test files for unsupported combinations of delivery types, source contexts and subresources during SourceContext resolution.
- To determine what delivery types can be used for
anotherPolicyplaceholder.
Example
For example, the following entry in source_context_list_schema:
"worker-classic": {
"sourceContextList": [
{
"sourceContextType": "top",
"policyDeliveries": [
"anotherPolicy"
]
},
{
"sourceContextType": "worker-classic",
"policyDeliveries": [
"policy"
]
}
],
"subresourcePolicyDeliveries": []
}
Defines a template to be instantiated with delivery_key, delivery_type and delivery_value values defined outside source_context_list_schema, which reads:
- A classic
WorkerGlobalScopeis created under the top-level Document, and has a policy defined bydelivery_key,delivery_typeanddelivery_value. - The top-level Document has a policy different from the policy given to the classic worker (to confirm that the policy of the classic worker, not of the top-level Document, is used).
- The subresource request is sent from the classic
WorkerGlobalScope, with no additional policies specified at the subresource request.
And when filled with the following values from a selection:
delivery_type:"http-rp"delivery_key:"referrerPolicy"delivery_value:"no-referrer-when-downgrade"
This becomes:
"worker-classic": {
"sourceContextList": [
{
"sourceContextType": "top",
"policyDeliveries": [
{
"deliveryType": "meta",
"key": "referrerPolicy",
"value": "no-referrer"
}
]
},
{
"sourceContextType": "worker-classic",
"policyDeliveries": [
{
"deliveryType": "http-rp",
"key": "referrerPolicy",
"value": "no-referrer-when-downgrade"
}
]
}
],
"subresourcePolicyDeliveries": []
}
which means
- The top-level Document has
<meta name="referrer" content="no-referrer">. - The classic worker is created with
Referrer-Policy: no-referrer-when-downgradeHTTP response headers.
Scenario Object
The scenario object is the JSON object written to the generated HTML files, and passed to JavaScript test runtime (as an argument of TestCase).
A scenario object is an selection object, minus the keys used in SourceContext Resolution:
source_context_listdelivery_typedelivery_keydelivery_value
plus the keys instantiated by SourceContext Resolution:
source_context_list, except for the first"top"entry.subresource_policy_deliveries
For example:
{
"source_context_list": [
{
"sourceContextType": "worker-classic",
"policyDeliveries": [
{
"deliveryType": "http-rp",
"key": "referrerPolicy",
"value": "no-referrer-when-downgrade"
}
]
}
],
"subresource_policy_deliveries": [],
"expectation": "stripped-referrer",
"origin": "same-http",
"redirection": "no-redirect",
"source_scheme": "http",
"subresource": "fetch"
}
TopLevelPolicyDelivery Object
The *TopLevelPolicyDelivery object is the first "top" entry of SourceContextList instantiated by SourceContext Resolution, which represents the policy delivery of the top-level HTML Document.
The generator generates <meta> elements and .headers files of the top-level HTML files from the TopLevelPolicyDelivery object.
This is handled separately by the generator from other parts of selection objects and scenario objects, because the <meta> and .headers are hard-coded directly to the files in the WPT repository, while policies of subcontexts are generated via server-side common/security-features/scope scripts.
TODO(https://github.com/web-platform-tests/wpt/issues/21710): Currently the name TopLevelPolicyDelivery doesn't appear in the code.
How the test runtime works
All the information needed at runtime is contained in an scenario object. See the code/comments of the following files.
project-directory/generic/test-case.jsdefinesTestCase, the entry point that receives a scenario object.resources/common.sub.jsdoes the most of common JavaScript work.- Subresource URLs (which point to
subresource/scripts) are calculated fromoriginandredirectionvalues. - Initiating fetch requests based on
subresourceandsubresource_policy_deliveries.
- Subresource URLs (which point to
scope/server-side scripts serve non-toplevel contexts, while the top-level Document is generated by the generator. TODO(https://github.com/web-platform-tests/wpt/issues/21709): Merge the logics ofscope/and the generator.subresource/server-side scripts serve subresource responses.