diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /dom/tests/mochitest/whatwg | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/tests/mochitest/whatwg')
43 files changed, 3920 insertions, 0 deletions
diff --git a/dom/tests/mochitest/whatwg/browserFu.js b/dom/tests/mochitest/whatwg/browserFu.js new file mode 100644 index 000000000..3fb5bdf95 --- /dev/null +++ b/dom/tests/mochitest/whatwg/browserFu.js @@ -0,0 +1,6 @@ +/** + * File which includes stuff for Mozilla-specific checks which shouldn't happen + * in other browsers but which we wish to test. + */ + +var isMozilla = navigator.product === "Gecko" && "buildID" in navigator; diff --git a/dom/tests/mochitest/whatwg/chrome.ini b/dom/tests/mochitest/whatwg/chrome.ini new file mode 100644 index 000000000..6d6bfc36c --- /dev/null +++ b/dom/tests/mochitest/whatwg/chrome.ini @@ -0,0 +1,3 @@ +[DEFAULT] + +[test_postMessage_chrome.html] diff --git a/dom/tests/mochitest/whatwg/file_bug500328_1.html b/dom/tests/mochitest/whatwg/file_bug500328_1.html new file mode 100644 index 000000000..941cb47c5 --- /dev/null +++ b/dom/tests/mochitest/whatwg/file_bug500328_1.html @@ -0,0 +1,51 @@ +<!DOCTYPE HTML> +<html> +<!-- +Inner frame for testing bug 500328. +https://bugzilla.mozilla.org/show_bug.cgi?id=500328 +--> +<head> +<title>test 1</title> + <style> + a { fill:blue; } + a:visited { fill:purple; } + </style> +</head> +<body onload="load(event);" onpopstate="popstate(event);" onpageshow="pageshow(event);"> +<script type="application/javascript"> + if (parent && parent.onChildScript) + parent.onChildScript(history.state); + if (opener && opener.onChildScript) + opener.onChildScript(history.state); + + function load(e) { + if(parent && parent.onChildLoad) + parent.onChildLoad(e); + if(opener && opener.onChildLoad) + opener.onChildLoad(e); + } + + function pageshow(e) { + if(parent && parent.onChildPageShow) + parent.onChildPageShow(e); + if(opener && opener.onChildPageShow) + opener.onChildPageShow(e); + } + + function popstate(e) { + if(parent && parent.onChildLoad) + parent.onChildPopState(e); + if(opener && opener.onChildLoad) + opener.onChildPopState(e); + } + + function navigateTo(loc) { + location = loc; + } + +</script> + +<a id="link-anchor1", href="#1">Link Anchor1</a> +<a id="link-self" href="file_bug500328_1.html">Self</a> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/file_bug500328_2.html b/dom/tests/mochitest/whatwg/file_bug500328_2.html new file mode 100644 index 000000000..3ce66493d --- /dev/null +++ b/dom/tests/mochitest/whatwg/file_bug500328_2.html @@ -0,0 +1,17 @@ +<!DOCTYPE HTML> +<html> +<!-- +Inner frame for testing bug 500328. +https://bugzilla.mozilla.org/show_bug.cgi?id=500328 +--> +<head> +</head> +<body> +<!-- + Yes, this page is basically blank. But no, about:blank wouldn't do as a + replacement, because we use this page to test that pushstate has correct + same-origin checks. +--> +file_bug500328_2.html +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/mochitest.ini b/dom/tests/mochitest/whatwg/mochitest.ini new file mode 100644 index 000000000..ab853b86c --- /dev/null +++ b/dom/tests/mochitest/whatwg/mochitest.ini @@ -0,0 +1,44 @@ +[DEFAULT] +support-files = + browserFu.js + postMessage_chrome_helper.html + postMessage_closed_helper.html + postMessage_hash.html + postMessage_helper.html + postMessage_idn_helper.html + postMessage.jar + postMessage.jar^headers^ + postMessage_joined_helper2.html + postMessage_joined_helper.html + postMessage_onOther.html + postMessage_origin_helper.xhtml + postMessage_override_helper.html + postMessage_structured_clone_helper.html + postMessage_structured_clone_helper.js + postMessage_throw_helper.html + postMessage_transfer_helper.html + postMessage_userpass_helper.html + +[test_bug477323.html] +[test_document_scripts.html] +[test_MessageEvent_dispatchToOther.html] +[test_MessageEvent.html] +[test_postMessage_basehref.html] +[test_postMessage_closed.html] +skip-if = toolkit == 'android' #bug 894914 - wrong data - got FAIL, expected message +[test_postMessage_hash.html] +[test_postMessage.html] +[test_postMessage_idn.xhtml] +[test_postMessage_jar.html] +[test_postMessage_joined.html] +[test_postMessage_onOther.html] +[test_postMessage_origin.xhtml] +[test_postMessage_override.html] +[test_postMessage_special.xhtml] +[test_postMessage_structured_clone.html] +[test_postMessage_throw.html] +[test_postMessage_transfer.html] +[test_postMessage_userpass.html] +[test_bug500328.html] +skip-if = true || toolkit=='android' # bug 696306, #TIMED_OUT android +support-files = file_bug500328_1.html file_bug500328_2.html diff --git a/dom/tests/mochitest/whatwg/postMessage.jar b/dom/tests/mochitest/whatwg/postMessage.jar Binary files differnew file mode 100644 index 000000000..d4ee4abc3 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage.jar diff --git a/dom/tests/mochitest/whatwg/postMessage.jar^headers^ b/dom/tests/mochitest/whatwg/postMessage.jar^headers^ new file mode 100644 index 000000000..28b8aa0a5 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage.jar^headers^ @@ -0,0 +1 @@ +Content-Type: application/java-archive diff --git a/dom/tests/mochitest/whatwg/postMessage_chrome_helper.html b/dom/tests/mochitest/whatwg/postMessage_chrome_helper.html new file mode 100644 index 000000000..86a57ed0f --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_chrome_helper.html @@ -0,0 +1,49 @@ +<!DOCTYPE html> +<html> +<head> + <title>postMessage chrome message receiver</title> + <script type="application/javascript"> + var gPrePath = ""; + + function receiveMessage(evt) + { + if (evt.data.substring(0,9) == "chrome://") { + gPrePath = evt.data; + respond("path-is-set"); + } else { + // Content cannot post to chrome without privileges + try { + window.parent.postMessage("SHOULD NOT GET THIS!", "*"); + } + catch (ex) { + } + + var msg = "post-to-content-response"; + + if (evt.source !== null) + msg += " wrong-source(" + evt.source + ")"; + if (!evt.isTrusted) + msg += " unexpected-untrusted-event"; + if (evt.type !== "message") + msg += " wrong-type(" + evt.type + ")"; + if (evt.origin !== gPrePath) + msg += " wrong-origin(" + evt.origin + ")"; + if (evt.data !== "post-to-content") + msg += " wrong-message(" + evt.data + ")"; + + respond(msg); + } + } + + function respond(msg) + { + SpecialPowers.wrap(window).parent.postMessage(msg, "*"); + } + + window.addEventListener("message", receiveMessage, false); + </script> +</head> +<body> +<h1 id="domain">example.org</h1> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_closed_helper.html b/dom/tests/mochitest/whatwg/postMessage_closed_helper.html new file mode 100644 index 000000000..240ae57b8 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_closed_helper.html @@ -0,0 +1,26 @@ +<!DOCTYPE html> +<html xmlns="http://www.w3.org/1999/xhtml"> +<head> + <title>postMessage closed page</title> + <script type="application/javascript"> +function receiveMessage(evt) +{ + evt.source.postMessage("FAIL", "*"); +} + +window.addEventListener("message", receiveMessage, false); + +function setup() +{ + var query = location.search.substring(1); + + if (query == "opener") + window.opener.postMessage("message", "http://mochi.test:8888"); +} + +window.addEventListener("load", setup, false); + </script> +</head> +<body> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_hash.html b/dom/tests/mochitest/whatwg/postMessage_hash.html new file mode 100644 index 000000000..adb82aa5f --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_hash.html @@ -0,0 +1,31 @@ +<!DOCTYPE html> +<html> +<head> + <title>Hashed kid for test_postMessage_hash.html</title> + <script type="application/javascript"> +function receiveMessage(evt) +{ + var response = "response-message"; + + if (window.location.href !== "http://mochi.test:8888/tests/dom/tests/mochitest/whatwg/postMessage_hash.html#hash") + response += " kid-at-wrong-uri(" + window.location.href + ")"; + + if (evt.origin !== "http://mochi.test:8888") + response += " wrong-origin(" + evt.origin + ")"; + if (evt.source !== window.parent) + response += " wrong-source"; + if (evt.data !== "from-parent") + response += " wrong-data(" + evt.data + ")"; + if (evt.lastEventId !== "") + response += " wrong-lastEventId(" + evt.lastEventId + ")"; + + window.parent.postMessage(response, "http://mochi.test:8888"); +} + +window.addEventListener("message", receiveMessage, false); + </script> +</head> +<body> +<p>Kid iframe</p> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_helper.html b/dom/tests/mochitest/whatwg/postMessage_helper.html new file mode 100644 index 000000000..86e34e9d4 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_helper.html @@ -0,0 +1,110 @@ +<!DOCTYPE html> +<html> +<head> + <title>postMessage message receiver</title> + <script type="application/javascript" src="browserFu.js"></script> + <script type="application/javascript"> + function $(id) { return document.getElementById(id); } + + function setup() + { + var target = $("domain"); + target.textContent = location.hostname + ":" + (location.port || 80); + } + + function receiveMessage(evt) + { + var response = evt.data + "-response"; + + if (evt.lastEventId !== "") + response += " wrong-lastEventId(" + evt.lastEventId + ")"; + + if (evt.source !== window.parent) + { + response += " unexpected-source(" + evt.source + ")"; + response += " window-parent-is(" + window.parent + ")"; + response += " location(" + window.location.href + ")"; + } + + if (isMozilla) + { + if (evt.isTrusted !== false) + response += " unexpected-trusted"; + } + + if (evt.type != "message") + response += " wrong-type(" + evt.type + ")"; + + var data = evt.data; + if (data == "post-to-other-same-domain") + { + receiveSame(evt, response); + } + else if (data == "post-to-other-cross-domain") + { + receiveCross(evt, response); + } + else + { + response += " unexpected-message-to(" + window.location.href + ")"; + window.parent.postMessage(response, "http://mochi.test:8888"); + return; + } + } + + function receiveSame(evt, response) + { + var source = evt.source; + try + { + if (evt.origin != "http://mochi.test:8888") + response += " unexpected-origin(" + evt.origin + ")"; + + try + { + var threw = false; + var privateVariable = source.privateVariable; + } + catch (e) + { + threw = true; + } + if (threw || privateVariable !== window.parent.privateVariable) + response += " accessed-source!!!"; + + } + finally + { + source.postMessage(response, evt.origin); + } + } + + function receiveCross(evt, response) + { + var source = evt.source; + if (evt.origin != "http://mochi.test:8888") + response += " unexpected-origin(" + evt.origin + ")"; + + try + { + var threw = false; + var privateVariable = source.privateVariable; + } + catch (e) + { + threw = true; + } + if (!threw || privateVariable !== undefined) + response += " accessed-source!!!"; + + source.postMessage(response, evt.origin); + } + + window.addEventListener("load", setup, false); + window.addEventListener("message", receiveMessage, false); + </script> +</head> +<body> +<h1 id="domain"></h1> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_idn_helper.html b/dom/tests/mochitest/whatwg/postMessage_idn_helper.html new file mode 100644 index 000000000..c66932280 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_idn_helper.html @@ -0,0 +1,41 @@ +<!DOCTYPE html> +<html> +<head> + <title>postMessage IDN test page</title> + <script type="application/javascript"> + function receiveMessage(evt) + { + var response = "idn-response"; + + if (!(evt instanceof MessageEvent)) + response += " not-a-MessageEvent"; + if (evt.origin !== "http://mochi.test:8888") + response += " wrong-sender-origin(" + evt.origin + ")"; + if (evt.data !== "idn-message") + response += " wrong-data(" + evt.data + ")"; + if (evt.lastEventId !== "") + response += " wrong-lastEventId(" + evt.lastEventId + ")"; + if (evt.source !== window.parent) + response += " wrong-source"; + if (evt.target !== window) + response += " wrong-target"; + if (evt.type !== "message") + response += " wrong-type(" + evt.type + ")"; + + evt.source.postMessage(response, evt.origin); + } + window.addEventListener("message", receiveMessage, false); + + function setup() + { + var target = document.getElementById("location"); + target.textContent = location.hostname + ":" + (location.port || 80); + } + + window.addEventListener("load", setup, false); + </script> +</head> +<body> +<h1 id="location">No location!</h1> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_joined_helper.html b/dom/tests/mochitest/whatwg/postMessage_joined_helper.html new file mode 100644 index 000000000..83988d103 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_joined_helper.html @@ -0,0 +1,91 @@ +<!DOCTYPE html> +<html> +<!-- +http://sub1.test1.example.org/tests/dom/tests/mochitest/whatwg/postMessage_joined_helper.html +--> +<head> + <title>postMessage joined domains, inner frame</title> + <script type="application/javascript" src="browserFu.js"></script> + <script type="application/javascript"> + function receiveMessage(evt) + { + var response, target, providedOrigin; + var data = evt.data; + if (data === "subframe-test-finished") + { + target = window.parent; + providedOrigin = "http://mochi.test:8888"; + response = "test-passed"; + } + else if (data === "start-test") + { + target = window.frames.innermost; + providedOrigin = "http://example.org"; + response = "start-test"; + } + else + { + target = window.parent; + providedOrigin = "http://mochi.test:8888"; + response = "not reached"; + } + + if (evt.lastEventId !== "") + response += " wrong-lastEventId(" + evt.lastEventId + ")"; + + if (evt.type !== "message") + response += " wrong-type(" + evt.type + ")"; + + if (evt.target !== window) + { + response += " wrong-target(" + evt.target + ")"; + response += " location(" + window.location.href + ")"; + } + + if (isMozilla && evt.isTrusted === true) + { + response += " unexpected-trusted-event"; + } + + var origin; + if (data == "subframe-test-finished") + origin = "http://example.org"; + else if (data === "start-test") + origin = "http://mochi.test:8888"; + else + origin = "unreached"; + + if (evt.origin !== origin) + { + response += " wrong-origin(" + evt.origin + ")"; + response += " location(" + window.location.href + ")"; + } + + target.postMessage(response, providedOrigin); + } + + function setup() + { + var oldDomain = document.domain; + var newDomain = "example.org"; + + document.domain = newDomain; + + var target = document.getElementById("location"); + target.textContent = "Location: " + oldDomain + + ", effective domain: " + newDomain; + + window.addEventListener("message", receiveMessage, false); + } + + window.addEventListener("load", setup, false); + </script> +</head> +<body> +<p id="location">No location!</p> + +<iframe src="http://example.org/tests/dom/tests/mochitest/whatwg/postMessage_joined_helper2.html" + name="innermost"></iframe> + +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_joined_helper2.html b/dom/tests/mochitest/whatwg/postMessage_joined_helper2.html new file mode 100644 index 000000000..7535b05d3 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_joined_helper2.html @@ -0,0 +1,78 @@ +<!DOCTYPE html> +<html> +<!-- +http://example.org/tests/dom/tests/mochitest/whatwg/postMessage_joined_helper2.html +--> +<head> + <title>postMessage joined domains, innermost frame</title> + <script type="application/javascript" src="browserFu.js"></script> + <script type="application/javascript"> + function receiveMessage(evt) + { + var response = "subframe-test-finished"; + + if (evt.origin !== "http://sub1.test1.example.org") + { + response += " wrong-origin(" + evt.origin + ")"; + response += " location(" + window.location.href + ")"; + } + + if (evt.data !== "start-test") + response += " incorrect-subframe-data(" + evt.data + ")"; + if (evt.type !== "message") + response += " wrong-type(" + evt.type + ")"; + if (evt.target !== window) + { + response += " wrong-target(" + evt.target + ")"; + response += " location(" + window.location.href + ")"; + } + + if (isMozilla) + { + if (evt.isTrusted !== false) + response += " unexpected-trusted-event"; + } + + if (evt.source !== window.parent) + { + response += " unexpected-source(" + evt.source + ")"; + response += " window-parent-is(" + window.parent + ")"; + response += " location(" + window.location.href + ")"; + } + + // verify that document.domain was actually joined with this domain + try + { + var passed = evt.source.document.domain === document.domain; + } + catch (e) + { + } + + if (!passed) + response += " expected-joined-domains"; + + window.parent.postMessage(response, "http://sub1.test1.example.org"); + } + + function setup() + { + var oldDomain = document.domain; + var newDomain = "example.org"; // join with parent + + document.domain = newDomain; + + var target = document.getElementById("location"); + target.textContent = "Location: " + oldDomain + + ", effective domain: " + newDomain; + + window.addEventListener("message", receiveMessage, false); + } + + window.addEventListener("load", setup, false); + </script> +</head> +<body> +<p id="location">No location!</p> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_onOther.html b/dom/tests/mochitest/whatwg/postMessage_onOther.html new file mode 100644 index 000000000..dd4cf370a --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_onOther.html @@ -0,0 +1,109 @@ +<!DOCTYPE html> +<html> +<head> + <title>postMessage called through another frame</title> + <script type="application/javascript"> + var PATH = "/tests/dom/tests/mochitest/whatwg/postMessage_onOther.html"; + + function receiveMessage(evt) + { + if (evt.lastEventId !== "") + { + fail("unexpected non-empty lastEventId"); + return; + } + + switch (window.location.href) + { + case "http://example.com" + PATH: + receiveTopDomain(evt); + break; + + case "http://test1.example.com" + PATH: + receiveSubDomain(evt); + break; + + default: + fail("unexpected location"); + } + } + + function fail(msg) + { + window.parent.postMessage("FAIL " + msg, "*"); + } + + // The parent frame sends "start-test" to the subdomain frame to start. + // The subdomain frame then sets document.domain to the top domain so that + // the top domain frame can access it. It then sends a message to the top + // domain frame to tell it to do likewise; once that happens, the top domain + // frame can then call a method on the subdomain frame window, which will + // call a method *on the top domain window* to send a message to the parent + // window. We thus expect to see an event whose source is the subdomain + // window -- *not* the top domain window. Therefore, its .origin should be: + // + // http://test1.example.com + // + // and not + // + // http://example.com + + function receiveSubDomain(evt) + { + if (evt.origin !== "http://mochi.test:8888") + { + fail("wrong top-domain origin: " + evt.origin); + return; + } + if (evt.data !== "start-test") + { + fail("wrong top-domain message: " + evt.origin); + return; + } + + document.domain = "example.com"; + window.parent.topDomainFrame.postMessage("domain-switch", + "http://example.com"); + } + + function receiveTopDomain(evt) + { + if (evt.origin !== "http://test1.example.com") + { + fail("wrong subdomain origin: " + evt.origin); + return; + } + if (evt.data !== "domain-switch") + { + fail("wrong subdomain message: " + evt.origin); + return; + } + if (evt.source !== window.parent.subDomainFrame) + { + fail("wrong source on message from subdomain"); + return; + } + + document.domain = "example.com"; + window.parent.subDomainFrame.testSiblingPostMessage(); + } + + function testSiblingPostMessage() + { + window.parent.postMessage("test-finished", "http://mochi.test:8888"); + } + + function setup() + { + var target = document.getElementById("location"); + target.textContent = location.hostname + ":" + (location.port || 80); + } + + window.addEventListener("message", receiveMessage, false); + window.addEventListener("load", setup, false); + </script> +</head> +<body> +<h1 id="location">No location!</h1> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml b/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml new file mode 100644 index 000000000..9dd00c1ee --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml @@ -0,0 +1,37 @@ +<!DOCTYPE html> +<html xmlns="http://www.w3.org/1999/xhtml"> +<head> + <title>postMessage origin-testing helper page</title> + <script type="application/javascript"><![CDATA[ +function receiveMessage(evt) +{ + var response = "PASS"; + + if (evt.origin !== "http://mochi.test:8888") + response += " wrong-origin(" + evt.origin + ")"; + if (evt.source !== window.parent) + response += " wrong-source"; + if (evt.data !== "PASS") + response += " wrong-data(" + evt.data + ")"; + + window.parent.postMessage(response, "http://mochi.test:8888"); +} + +window.addEventListener("message", receiveMessage, false); + + +// Aids for identifying origins + +function setup() +{ + var target = document.getElementById("location"); + target.textContent = location.hostname + ":" + (location.port || 80); +} + +window.addEventListener("load", setup, false); + ]]></script> +</head> +<body> +<h1 id="location">No location!</h1> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_override_helper.html b/dom/tests/mochitest/whatwg/postMessage_override_helper.html new file mode 100644 index 000000000..ffe5d628a --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_override_helper.html @@ -0,0 +1,42 @@ +<!DOCTYPE html> +<html> +<head> + <title>Overriding postMessage and dispatchEvent bindings</title> + <script type="application/javascript"> + window.postMessage = function (evt) + { + window.parent.postMessage("FAIL overridden postMessage called", "*"); + }; + + var count = 0; + + function receiveMessage(evt) + { + count++; + if (count == 1) + { + window.dispatchEvent = function(evt) + { + window.parent.postMessage("FAIL", "*"); + throw "dispatchEvent threw"; + }; + } + + window.parent.postMessage(evt.data, "http://mochi.test:8888"); + } + + function setup() + { + var target = document.getElementById("location"); + target.textContent = location.hostname + ":" + (location.port || 80); + } + + window.addEventListener("message", receiveMessage, false); + + window.addEventListener("load", setup, false); + </script> +</head> +<body> +<h1 id="location">No location!</h1> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_structured_clone_helper.html b/dom/tests/mochitest/whatwg/postMessage_structured_clone_helper.html new file mode 100644 index 000000000..b3cdfac2f --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_structured_clone_helper.html @@ -0,0 +1,106 @@ +<!DOCTYPE html> +<html> +<head> + <title>postMessage structured clone page</title> + <script type="application/javascript;version=1.7" + src="postMessage_structured_clone_helper.js"></script> + <script type="application/javascript;version=1.7"> + var generator = new getTestContent() + + function isClone(a, b) { + window.dump("Object a: " + a + "\n"); + window.dump("Object b: " + b + "\n"); + var stack = [[a, b]]; + var memory = new WeakMap(); + var rmemory = new WeakMap(); + + while (stack.length > 0) { + var pair = stack.pop(); + var x = pair[0], y = pair[1]; + if (typeof x !== "object" || x === null) { + // x is primitive. + if (x !== y) { + window.dump("Primitives not equal!\n"); + return false; + } + } else if (x instanceof Date) { + if (x.getTime() == y.getTime()) + return true; + window.dump("Dates not equal!\n"); + return false; + } else if (memory.has(x)) { + // x is an object we have seen before in a. + if (y !== memory.get(x)) { + window.dump("Already seen!?\n"); + return false; + } + if (!(rmemory.get(y) == x)) { + window.dump("Not equal??\n"); + return false; + } + } else { + // x is an object we have not seen before. + // Check that we have not seen y before either. + if (rmemory.has(y)) { + // If we have seen y before, the only possible outcome + // is that x and y are literally the same object. + if (y == x) + continue; + window.dump("Already seen y!?\n"); + window.dump(y.toString() + "\n"); + return false; + } + + // x and y must be of the same [[Class]]. + var xcls = Object.prototype.toString.call(x); + var ycls = Object.prototype.toString.call(y); + if (xcls !== ycls) { + window.dump("Failing on proto\n"); + return false; + } + + // This function is only designed to check Objects and Arrays. + if (!(xcls === "[object Object]" || xcls === "[object Array]")) { + window.dump("Not an object!\n"); + window.dump(xcls + "\n"); + return false; + } + + // Compare objects. + var xk = Object.keys(x), yk = Object.keys(y); + if (xk.length !== yk.length) { + window.dump("Length mismatch!\n"); + return false; + } + for (var i = 0; i < xk.length; i++) { + // We must see the same property names in the same order. + if (xk[i] !== yk[i]) { + window.dump("wrong order\n"); + return false; + } + + // Put the property values on the stack to compare later. + stack.push([x[xk[i]], y[yk[i]]]); + } + + // Record that we have seen this pair of objects. + memory.set(x, y); + rmemory.set(y, x); + } + } + return true; + } + + function receiveMessage(evt) + { + if (isClone(evt.data, generator.next())) + window.parent.postMessage("TEST-PASS", "*"); + else + window.parent.postMessage("TEST-FAIL", "*"); + } + window.addEventListener("message", receiveMessage, false); + </script> +</head> +<body> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_structured_clone_helper.js b/dom/tests/mochitest/whatwg/postMessage_structured_clone_helper.js new file mode 100644 index 000000000..d56bc3298 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_structured_clone_helper.js @@ -0,0 +1,63 @@ +function getTestContent() +{ + yield "hello"; + yield 2+3; + yield 12; + yield null; + yield "complex" + "string"; + yield new Object(); + yield new Date(1306113544); + yield [1, 2, 3, 4, 5]; + let obj = new Object(); + obj.foo = 3; + obj.bar = "hi"; + obj.baz = new Date(1306113544); + obj.boo = obj; + yield obj; + + let recursiveobj = new Object(); + recursiveobj.a = recursiveobj; + recursiveobj.foo = new Object(); + recursiveobj.foo.bar = "bar"; + recursiveobj.foo.backref = recursiveobj; + recursiveobj.foo.baz = 84; + recursiveobj.foo.backref2 = recursiveobj; + recursiveobj.bar = new Object(); + recursiveobj.bar.foo = "foo"; + recursiveobj.bar.backref = recursiveobj; + recursiveobj.bar.baz = new Date(1306113544); + recursiveobj.bar.backref2 = recursiveobj; + recursiveobj.expando = recursiveobj; + yield recursiveobj; + + obj = new Object(); + obj.expando1 = 1; + obj.foo = new Object(); + obj.foo.bar = 2; + obj.bar = new Object(); + obj.bar.foo = obj.foo; + obj.expando = new Object(); + obj.expando.expando = new Object(); + obj.expando.expando.obj = obj; + obj.expando2 = 4; + obj.baz = obj.expando.expando; + obj.blah = obj.bar; + obj.foo.baz = obj.blah; + obj.foo.blah = obj.blah; + yield obj; + + let diamond = new Object(); + obj = new Object(); + obj.foo = "foo"; + obj.bar = 92; + obj.backref = diamond; + diamond.ref1 = obj; + diamond.ref2 = obj; + yield diamond; + + let doubleref = new Object(); + obj = new Object(); + doubleref.ref1 = obj; + doubleref.ref2 = obj; + yield doubleref; +} diff --git a/dom/tests/mochitest/whatwg/postMessage_throw_helper.html b/dom/tests/mochitest/whatwg/postMessage_throw_helper.html new file mode 100644 index 000000000..b3d22c657 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_throw_helper.html @@ -0,0 +1,24 @@ +<!DOCTYPE html> +<html> +<head> + <title>postMessage throwing page</title> + <script type="application/javascript"> + function receiveMessage(evt) + { + throw 17; + } + window.addEventListener("message", receiveMessage, false); + + function setup() + { + var target = document.getElementById("location"); + target.textContent = location.hostname + ":" + (location.port || 80); + } + + window.addEventListener("load", setup, false); + </script> +</head> +<body> +<h1 id="location">No location!</h1> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_transfer_helper.html b/dom/tests/mochitest/whatwg/postMessage_transfer_helper.html new file mode 100644 index 000000000..03c4c1030 --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_transfer_helper.html @@ -0,0 +1,15 @@ +<!DOCTYPE html> +<html> +<head><meta charset=utf-8> + <title>postMessage transferable tests helper</title> +</head> +<body> +<script> + +onmessage = function(e) { + parent.postMessage(e.data, "*"); +}; + +</script> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/postMessage_userpass_helper.html b/dom/tests/mochitest/whatwg/postMessage_userpass_helper.html new file mode 100644 index 000000000..fab25b59d --- /dev/null +++ b/dom/tests/mochitest/whatwg/postMessage_userpass_helper.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<html> +<head> + <title>Username/password page for postMessage tests</title> + <script type="application/javascript"> + +function sendMessage(evt) +{ + var msg = "child-message"; + + if (evt.origin !== "http://mochi.test:8888") + msg += " wrong-origin(" + evt.origin + ")"; + if (evt.data !== "parent-message") + msg += " wrong-data(" + evt.data + ")"; + if (evt.lastEventId !== "") + msg += " wrong-lastEventId(" + evt.lastEventId + ")"; + if (evt.source !== window.parent) + msg += " wrong-source"; + + // It would be good to guarantee that we've been opened with a userinfo of + // "bobhope:password", but Gecko elides that from the content-visible URL, + // and I can't find another way to actually detect this programmatically. + + window.parent.postMessage(msg, "http://mochi.test:8888"); +} + +window.addEventListener("message", sendMessage, false); + </script> +</head> +<body> +<p>Kid iframe</p> +</body> +</html> + diff --git a/dom/tests/mochitest/whatwg/test_MessageEvent.html b/dom/tests/mochitest/whatwg/test_MessageEvent.html new file mode 100644 index 000000000..ce30cd406 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_MessageEvent.html @@ -0,0 +1,103 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>MessageEvent tests</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"> + +</div> + +<button id="target">target</button> + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +var data = "foobar"; +var origin = "http://cool.example.com"; +var bubbles = true, cancelable = true; +var lastEventId = "lastEventId"; + +var target; + +var count = 0; + +function sendMsg() +{ + try + { + var evt = new MessageEvent('message', { + bubbles: bubbles, cancelable: cancelable, data: data, + origin: origin, lastEventId: lastEventId, source: window}); + ok(evt instanceof MessageEvent, "I ordered a MessageEvent!"); + + is(evt.data, data, "unexpected data"); + is(evt.origin, origin, "unexpected origin"); + is(evt.lastEventId, lastEventId, "unexpected lastEventId"); + + is(evt.cancelable, cancelable, "wrong cancelable property"); + is(evt.bubbles, bubbles, "wrong bubbling property"); + is(evt.source, window, "wrong source"); + + return target.dispatchEvent(evt); + } + catch (e) + { + ok(false, "exception thrown: " + e); + return false; + } +} + +function recvMsg(evt) +{ + is(evt.data, data, "unexpected data"); + is(evt.origin, origin, "unexpected origin"); + is(evt.lastEventId, lastEventId, "unexpected lastEventId"); + + is(evt.cancelable, cancelable, "wrong cancelable property"); + is(evt.bubbles, bubbles, "wrong bubbling property"); + is(evt.source, window, "wrong source"); + + is(evt.target, target, "wrong target"); + + if (target == evt.currentTarget) + { + is(Event.AT_TARGET, evt.eventPhase, "this listener was on the target"); + } + else + { + is(evt.currentTarget, document, "should have gotten this at the window"); + is(Event.BUBBLING_PHASE, evt.eventPhase, "wrong phase"); + } + + count++; +} + +function setup() +{ + target = $("target"); + target.addEventListener("message", recvMsg, false); + document.addEventListener("message", recvMsg, false); + var res = sendMsg(); + ok(res === true, "nothing canceled this"); + is(count, 2, "listener not called twice"); + SimpleTest.finish(); +} + +addLoadEvent(setup); + +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_MessageEvent_dispatchToOther.html b/dom/tests/mochitest/whatwg/test_MessageEvent_dispatchToOther.html new file mode 100644 index 000000000..0b742e4f1 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_MessageEvent_dispatchToOther.html @@ -0,0 +1,59 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>Dispatching MessageEvent across origins</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://example.com/" name="otherDomain"></iframe> + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +function run() +{ + try + { + var msg = new MessageEvent('message', { bubbles: true, cancelable: true, + data: "foo", origin: "http://evil.com", + source: window }); + + try + { + var ex; + window.frames.otherDomain.dispatchEvent(msg); + ok(false, "should have thrown a security exception per HTML5"); + } + catch (e) + { + ok(true, "correctly threw an exception (security exception, but " + + "what that entails isn't yet defined in the spec)"); + } + } + catch (e) + { + ok(false, "threw exception during execution: " + e); + } + finally + { + SimpleTest.finish(); + } +} + +addLoadEvent(run); + +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_bug477323.html b/dom/tests/mochitest/whatwg/test_bug477323.html new file mode 100644 index 000000000..030c8f43b --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_bug477323.html @@ -0,0 +1,64 @@ +<!DOCTYPE html> +<html> +<head> + <title>Dynamically assigned drag and drop handlers</title> + <script type="text/javascript" src="/MochiKit/MochiKit.js"></script> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="/tests/SimpleTest/EventUtils.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body onload="start()"> +<script class="testbody" type="application/javascript"> + +SimpleTest.waitForExplicitFinish(); + +function start() +{ + var element = document.getElementById("draggable_img"); + + var gotdragstart = false, gotdrag = false, + gotdragenter = false, gotdragover = false, gotdragleave = false, + gotdrop = false, gotdragend = false; + + element.ondragstart = function(event) {gotdragstart = true;} + element.ondrag = function(event) {gotdrag = true;} + element.ondragenter = function(event) {gotdragenter = true;} + element.ondragover = function(event) {gotdragover = true;} + element.ondragleave = function(event) {gotdragleave = true;} + element.ondrop = function(event) {gotdrop = true;} + element.ondragend = function(event) {gotdragend = true;} + + function dispatch(eventName) + { + var event = document.createEvent("DragEvent"); + event.initDragEvent(eventName, true, true, window, 0, 5, 5, 5, 5, + false, false, false, false, 0, null, null); + element.dispatchEvent(event); + } + + dispatch("dragstart"); + dispatch("drag"); + dispatch("dragenter"); + dispatch("dragover"); + dispatch("dragleave"); + dispatch("drop"); + dispatch("dragend"); + + ok(gotdragstart, "Got ondragstart event"); + ok(gotdrag, "Got ondrag event"); + ok(gotdragenter, "Got ondragenter event"); + ok(gotdragover, "Got ondragover event"); + ok(gotdragleave, "Got ondragleave event"); + ok(gotdrop, "Got ondrop event"); + ok(gotdragend, "Got ondragend event"); + + SimpleTest.finish(); +} + +</script> + +<img src="data:image/png,%89PNG%0D%0A%1A%0A%00%00%00%0DIHDR%00%00%00%18%00%00%00%18%02%03%00%00%00%9D%19%D5k%00%00%00%04gAMA%00%00%B1%8F%0B%FCa%05%00%00%00%0CPLTE%FF%FF%FF%FF%FF%FF%F7%DC%13%00%00%00%03%80%01X%00%00%00%01tRNS%08N%3DPT%00%00%00%01bKGD%00%88%05%1DH%00%00%00%09pHYs%00%00%0B%11%00%00%0B%11%01%7Fd_%91%00%00%00%07tIME%07%D2%05%0C%14%0C%0D%D8%3F%1FQ%00%00%00%5CIDATx%9C%7D%8E%CB%09%C0%20%10D%07r%B7%20%2F%E9wV0%15h%EA%D9%12D4%BB%C1x%CC%5C%1E%0C%CC%07%C0%9C0%9Dd7()%C0A%D3%8D%E0%B8%10%1DiCHM%D0%AC%D2d%C3M%F1%B4%E7%FF%10%0BY%AC%25%93%CD%CBF%B5%B2%C0%3Alh%CD%AE%13%DF%A5%F7%E0%03byW%09A%B4%F3%E2%00%00%00%00IEND%AEB%60%82" + draggable="true" id="draggable_img"/> + +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_bug500328.html b/dom/tests/mochitest/whatwg/test_bug500328.html new file mode 100644 index 000000000..6b6e2ea98 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_bug500328.html @@ -0,0 +1,771 @@ +<!DOCTYPE HTML> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=500328 +--> +<head> + <title>Test for Bug 500328</title> + <script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="application/javascript" src="/tests/SimpleTest/EventUtils.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=500328">Mozilla Bug 500328</a> +<p id="display"></p> +<div id="status"></div> +<div id="content"> + <iframe id="iframe"></iframe> + <iframe id="iframe2"></iframe> + <a id="link">link</a> +</div> +<pre id="test"> +<script type="application/javascript;version=1.7"> + +/** Test for Bug 500328 **/ + +SimpleTest.waitForExplicitFinish(); + +var iframe = document.getElementById("iframe"); +var iframeCw = iframe.contentWindow; + +var iframe2 = document.getElementById("iframe2"); +var iframe2Cw = iframe2.contentWindow; + +const unvisitedColor = "rgb(0, 0, 238)"; +const visitedColor = "rgb(85, 26, 139)"; + +var gCallbackOnIframeLoad = false; +var gCallbackOnIframePageShow = false; +var gCallbackOnPopState = false; +var gNumPopStates = 0; +var gLastPopStateEvent; +var gLastScriptHistoryState; + +var gGen; + +function statusMsg(msg) { + var msgElem = document.createElement("p"); + msgElem.appendChild(document.createTextNode(msg)); + + document.getElementById("status").appendChild(msgElem); +} + +function longWait() { + function hitEventLoop(times, func) { + if (times > 0) { + setTimeout(hitEventLoop, 0, times - 1, func); + } else { + setTimeout(func, 0); + } + } + hitEventLoop(100, function() { gGen.next(); }); +} + +function shortWait() { + setTimeout(function() { gGen.next(); }, 0); +} + +function onChildPopState(e) { + gNumPopStates++; + gLastPopStateEvent = e; + if (gCallbackOnPopState) { + statusMsg("Popstate(" + JSON.stringify(e.state) + "). Calling gGen.next()."); + gCallbackOnPopState = false; + gGen.next(); + } + else { + statusMsg("Popstate(" + JSON.stringify(e.state) + "). NOT calling gGen.next()."); + } +} + +function onChildScript(state) { + gLastScriptHistoryState = state; +} + +function getURLFromEvent(e) { + try { + var target = e.target; + if ("contentWindow" in target) { + return target.contentWindow.location.toString(); + } + if ("ownerDocument" in target && target.ownerDocument) { + return target.ownerDocument.location.toString(); + } + if ("location" in target) { + return target.location.toString(); + } + return target.toString(); + } + catch(ex) { + return "<cross-site object>"; + } +} + +function onChildLoad(e) { + if(gCallbackOnIframeLoad) { + statusMsg("Got load for " + getURLFromEvent(e) + ". About to call gGen.next()."); + gCallbackOnIframeLoad = false; + gGen.next(); + } + else { + statusMsg("Got load for " + getURLFromEvent(e) + ", but not calling gGen.next() because gCallbackOnIframeLoad was false."); + } +} + +function onChildPageShow(e) { + if(gCallbackOnIframePageShow) { + statusMsg("Got pageshow for " + getURLFromEvent(e) + ". About to call gGen.next()."); + gCallbackOnIframePageShow = false; + SimpleTest.executeSoon(function() { gGen.next(); }); + } + else { + statusMsg("Got pageshow for " + getURLFromEvent(e) + ", but not calling gGen.next() because gCallbackOnIframePageShow was false."); + } +} + +function enableChildLoadCallback() { + gCallbackOnIframeLoad = true; +} + +function enableChildPageShowCallback() { + gCallbackOnIframePageShow = true; +} + +function enableChildPopStateCallback() { + gCallbackOnPopState = true; +} + +function clearPopStateCounter() { + gNumPopStates = 0; +} + +function noPopStateExpected(msg) { + is(gNumPopStates, 0, msg); + + // Even if there's an error, set gNumPopStates to 0 so other tests don't + // fail. + gNumPopStates = 0; +} + +function popstateExpected(msg) { + is(gNumPopStates, 1, msg); + gNumPopStates = 0; +} + +function getColor(elem) { + var utils = SpecialPowers.wrap(document).defaultView. + QueryInterface(SpecialPowers.Ci.nsIInterfaceRequestor). + getInterface(SpecialPowers.Ci.nsIDOMWindowUtils); + return utils.getVisitedDependentComputedStyle(elem, "", "color"); +} + +function getSHistory(theWindow) +{ + const Ci = SpecialPowers.Ci; + var sh = SpecialPowers.wrap(theWindow.QueryInterface(Ci.nsIInterfaceRequestor)) + .getInterface(Ci.nsIWebNavigation) + .sessionHistory; + if (!sh || sh == null) + throw("Couldn't get shistory for window!"); + + return sh; +} + +function getSHTitle(sh, offset) +{ + if (!offset) + offset = 0; + + // False instructs the SHistory not to modify its current index. + return sh.getEntryAtIndex(sh.index + offset, false).title; +} + +// Tests that win's location ends with str +function locationEndsWith(win, str) { + var exp = new RegExp(str + "$"); + ok(win.location.toString().match(exp), + "Wrong window location. Expected it to end with " + + str + ", but actuall was " + win.location); +} + +function expectException(func, msg) { + var failed = false; + try { + func(); + } catch(ex) { + failed = true; + } + + ok(failed, msg + " succeeded, but should have failed."); +} + +function runTest() { + // We can't enable universal XPConnect privleges in this function, because + // test 5 needs to be running at normal privleges in order to test the + // same-origin policy. + + /** + * PRELIMINARY: + * 1. Clear the popstate counter + */ + + clearPopStateCounter(); + + // The URL of file_bug500328_1.html on http://localhost:8888 + var innerLoc; + + // Now we can start the tests + + /** + * TEST 1 tests basic pushState functionality + */ + enableChildLoadCallback(); + iframeCw.location = "file_bug500328_1.html"; + yield undefined; + innerLoc = iframeCw.location.toString(); + // No popstate during initial load. + shortWait(); + yield undefined; + noPopStateExpected("No initial popstate."); + is(JSON.stringify(gLastScriptHistoryState), "null", "null initial state."); + statusMsg("Awake after first load."); + + // Make sure that the pushstate below doesn't trigger a hashchange. + iframeCw.onhashchange = function() { + ok(false, "Pushstate shouldn't trigger a hashchange."); + }; + + var testObj1 = 42; + var testObj2 = { x: 4.2 }; + iframeCw.history.pushState(testObj1, "test 1"); + is(JSON.stringify(iframeCw.history.state), JSON.stringify(testObj1), + "correct state after pushState"); + is(iframeCw.location.search, "", + "First pushstate should leave us where we were."); + + iframeCw.history.pushState(testObj2, "test 1#foo", "?test1#foo"); + is(JSON.stringify(iframeCw.history.state), JSON.stringify(testObj2), + "correct state after pushState"); + isnot(iframeCw.history.state, testObj2, + "correct state object identity after pushState"); + is(iframeCw.location.search, "?test1", + "Second pushstate should push us to '?test1'."); + is(iframeCw.location.hash, "#foo", + "Second pushstate should push us to '#foo'"); + shortWait(); + yield undefined; + + // Let the hashchange event fire, if it's going to. + longWait(); + yield undefined; + iframeCw.onhashchange = null; + + statusMsg("About to go back to page 1."); + // We don't have to yield here because this back() and the resulting popstate + // are completely synchronous. In fact, if we did yield, JS would throw an + // error because we'd be calling gGen.next from within gGen.next. + iframeCw.history.back(); + + statusMsg("Awake after going back to page 1."); + popstateExpected("Going back to page 1 should trigger a popstate."); + is(gLastPopStateEvent.isTrusted, true, 'Popstate event should be trusted.'); + is(JSON.stringify(gLastPopStateEvent.state), JSON.stringify(testObj1), + "Wrong state object popped after going back to page 1."); + ok(gLastPopStateEvent.state === iframeCw.history.state, + "Wrong state object in document after going back to page 1."); + ok(iframeCw.location.toString().match(/file_bug500328_1.html$/), + "Going back to page 1 hould take us to original page."); + + iframeCw.history.back(); + popstateExpected("Going back to page 0 should trigger a popstate."); + is(gLastPopStateEvent.state, null, + "Going back to page 0 should pop a null state."); + is(iframeCw.history.state, null, + "Going back to page 0 should pop a null state."); + is(iframeCw.location.search, "", + "Going back to page 0 should clear the querystring."); + + iframeCw.history.forward(); + popstateExpected("Going forward to page 1 should trigger a popstate."); + is(JSON.stringify(gLastPopStateEvent.state), JSON.stringify(testObj1), + "Wrong state object popped after going forward to page 1."); + is(gLastPopStateEvent.state, iframeCw.history.state, + "Wrong state object in document after going forward to page 1."); + ok(iframeCw.location.toString().match(/file_bug500328_1.html$/), + "Going forward to page 1 should leave us at original page."); + + statusMsg("About to go forward to page 2."); + iframeCw.history.forward(); + statusMsg("Awake after going forward to page 2."); + popstateExpected("Going forward to page 2 should trigger a popstate."); + is(JSON.stringify(gLastPopStateEvent.state), JSON.stringify(testObj2), + "Wrong state object popped after going forward to page 2."); + is(iframeCw.history.state, gLastPopStateEvent.state, + "Wrong state object in document after going forward to page 2."); + ok(iframeCw.location.toString().match(/file_bug500328_1.html\?test1#foo$/), + "Going forward to page 2 took us to " + iframeCw.location.toString()); + + statusMsg("About to reload page 2."); + iframeCw.location.reload(); + enableChildLoadCallback(); + yield undefined; + statusMsg("Awake after reloading page 2."); + noPopStateExpected("Reloading page 2 should not trigger popstate."); + is(JSON.stringify(iframeCw.history.state), JSON.stringify(testObj2), + "Wrong state object after reloading page 2."); + is(JSON.stringify(gLastScriptHistoryState), JSON.stringify(testObj2), + "Wrong state object while reloading page 2."); + ok(iframeCw.location.toString().match(/file_bug500328_1.html\?test1#foo$/), + "Reloading page 2 took us to " + iframeCw.location.toString()); + + // The iframe's current location is file_bug500328_1.html?test1#foo. + // Clicking link1 should take us to file_bug500328_1.html?test1#1. + + enableChildPopStateCallback(); + sendMouseEvent({type:'click'}, 'link-anchor1', iframeCw); + yield undefined; + popstateExpected("Clicking on link-anchor1 should trigger a popstate."); + is(iframeCw.location.search, "?test1", + "search should be ?test1 after clicking link."); + is(iframeCw.location.hash, "#1", + "hash should be #1 after clicking link."); + is(iframeCw.history.state, null, + "Wrong state object in document after clicking link to hash '#1'."); + + /* + * Reload file_bug500328_1.html; we're now going to test that link hrefs + * and colors are updated correctly on push/popstates. + */ + + iframe.onload = onChildLoad; + enableChildLoadCallback(); + iframeCw.location = "about:blank"; + yield undefined; + enableChildLoadCallback(); + iframeCw.location = "file_bug500328_1.html"; + yield undefined; + noPopStateExpected("No popstate after re-loading file_bug500328_1.html"); + statusMsg("Done loading file_bug500328_1.html for the second time."); + + var ifLink = iframeCw.document.getElementById("link-anchor1"); + var rand = Date.now() + "-" + Math.random(); + ifLink.href = rand; + + // Poll the document until the link has the correct color, or this test times + // out. Unfortunately I can't come up with a more elegant way to do this. + // We could listen to MozAfterPaint, but that doesn't guarantee that we'll + // observe the new color. + while (getColor(ifLink) != unvisitedColor) { + // Dump so something shows up in the mochitest logs if we spin here. + dump("ifLink has wrong initial color. Spinning...\n"); + setTimeout(function() { gGen.next(); }, 0); + yield undefined; + } + + // Navigate iframe2 to dir/${rand} + iframe2.onload = onChildLoad; + enableChildLoadCallback(); + iframe2Cw.location = "mytestdir/" + rand; + yield undefined; + + // PushState the iframe into the mytestdir directory. This should cause + // ifLink to turn purple, since we just visited mytestdir/${rand} in iframe2. + iframeCw.history.pushState(null, "foo", "mytestdir/foo"); + + // Check that the link's color is now visitedColor + while (getColor(ifLink) != visitedColor) { + dump("ifLink has wrong color after pushstate. Spinning...\n"); + setTimeout(function() { gGen.next(); }, 0); + yield undefined; + } + + ok(ifLink.href.match("mytestdir\\/" + rand + "$"), + "inner frame's link should end with 'mytestdir/${rand}'"); + + // Navigate out of the mytestdir directory. This should cause ifLink to turn + // blue again. + iframeCw.history.pushState(null, "bar", "../file_bug500328_1.html"); + + // Check that the link's color is back to the unvisited color. + while (getColor(ifLink) != unvisitedColor) { + dump("ifLink has wrong color after pushstating out of dir. Spinning...\n"); + setTimeout(function() { gGen.next(); }, 0); + yield undefined; + } + + ok(!ifLink.href.match("mytestdir"), + "inner frame's link shouldn't contain 'mytestdir'."); + + /* + * TEST 2 tests that pushstate's same-origin checks are correct. + */ + var filename = 'file_bug500328_2.html'; + var dirname = document.location.pathname.replace(/[^\/]*$/, ''); + statusMsg("Dirname is: " + dirname); + iframeCw.location = filename; + iframe.onload = onChildLoad; + enableChildLoadCallback(); + yield undefined; + + // This function tries to pushstate and replacestate to the given URL and + // fails the test if the calls succeed. + var tryBadPushAndReplaceState = function(url) { + // XXX ex should be a SECURITY_ERR, not a plain Error. + + var hist = iframeCw.history; + var url2 = url + dirname + filename; + + expectException(function() { hist.pushState({}, "foo", url); }, + 'pushState to ' + url); + + expectException(function() { hist.pushState({}, "foo", url2); }, + 'pushState to ' + url2); + + expectException(function() { hist.replaceState({}, "foo", url); }, + 'replaceState to ' + url); + + expectException(function() { hist.replaceState({}, "foo", url2); }, + 'replaceState to ' + url2); + } + + // We're currently at http://example.com/[dirname]/[filename] + tryBadPushAndReplaceState("https://mochi.test:8888"); + tryBadPushAndReplaceState("http://foo.mochitest:8888"); + tryBadPushAndReplaceState("http://mochi.test:1234"); + tryBadPushAndReplaceState("http://mochi.test.a:8888"); + tryBadPushAndReplaceState("http://mochi.tes:8888"); + tryBadPushAndReplaceState("http://mmochi.test:8888"); + tryBadPushAndReplaceState("http://me@mochi.test:8888"); + + /** + * TEST 3 tests that the session history entries' titles are properly sync'ed + * after push/pop states. + * + * We have to run this test in a popup rather than an iframe because only the + * root docshell has a session history object. + */ + statusMsg("About to open popup."); + var popup = window.open("file_bug500328_1.html", "popup0", + "height=200,width=200,location=yes," + + "menubar=yes,status=yes,toolbar=yes,dependent=yes"); + + enableChildLoadCallback(); + var shistory = getSHistory(popup); + yield undefined; + shortWait(); + yield undefined; + noPopStateExpected("Shouldn't get popstate after opening window."); + + popup.history.pushState(null, "title 0"); + ok(SpecialPowers.isBackButtonEnabled(popup), + "Back button was not enabled after initial pushstate."); + + popup.document.title = "title 1"; + + // Yield to the event loop so listeners will be notified of the title change + // and so that the hash change we trigger below generates a new session + // history entry. + shortWait(); + yield undefined; + + // Check that the current session history entry's title has been updated to + // reflect the new document title. + is(getSHTitle(shistory), "title 1", "SHEntry title test 1"); + + // Change the page's hash to #1, which will trigger a popstate event. + // We don't have to wait, because this happens synchronously. + popup.location.hash = "#1"; + popstateExpected("Didn't get popstate after changing hash."); + + popup.document.title = "title 2"; + + // Yield so listeners will be notified of the title change we just performed. + shortWait(); + yield undefined; + + is(getSHTitle(shistory), "title 2", "SHEntry title test 2"); + + // Go back. Happens synchronously. We should get a popstate. + statusMsg("About to go back."); + popup.history.go(-1); + popstateExpected("Didn't get a popstate after going back."); + + // Even though we went back, we expect the SHEntry title to remain the same + // because the document didn't change. + is(getSHTitle(shistory), "title 2", "SHEntry title test 3"); + + popup.document.title = "Changed 1"; + shortWait(); + yield undefined; + + // This check is really a test of bug 509055. + is(getSHTitle(shistory), "Changed 1", "SHEntry title test 4"); + + popup.close(); + + /** + * TEST 4 tests replaceState and that we don't get double popstates on + * window.open. It also stress-tests the system and its interaction with + * bfcache by making many push/replace state calls. + */ + popup = window.open("file_bug500328_1.html", "popup1", + "height=200,width=200,location=yes," + + "menubar=yes,status=yes,toolbar=yes,dependent=yes"); + + // The initial about:blank load into the new window shouldn't result in us + // seeing a popstate. Once file_bug500328_1.html is loaded, it'll overwrite + // popup.onpopstate, and this assertion won't fire for that popstate and + // others after. + // + // If we fired the popstate event asynchronously, we'd expect this assert to + // fire. + popup.onpopstate = function() { + ok(false, "Initial load of popup shouldn't give us a popstate."); + }; + + shistory = getSHistory(popup); + + enableChildLoadCallback(); + yield undefined; + statusMsg("Awake after loading content into popup."); + + popup.history.replaceState({n:1, ok:true}, "state 1", "good1.html"); + locationEndsWith(popup, "good1.html"); + + // Even though we replaceState with title "state 1", the title should remain + // "test 1" because we ignore the title argument in push/replaceState. + // See bug 544535. + is(getSHTitle(shistory), "test 1", "SHEntry title 'state 1'"); + + // Flush the event loop so our next load creates a new session history entry. + shortWait(); + yield undefined; + + enableChildLoadCallback(); + popup.location = "file_bug500328_1.html"; + yield undefined; + + // Flush the event loop so nsDocShell::OnNewURI runs and our load is recorded + // properly. + shortWait(); + yield undefined; + + // Now go back and make sure everything is as it should be. + enableChildPageShowCallback(); + popup.history.back(); + yield undefined; + // Flush the event loop so the document's location is updated and any + // popstates fire. + shortWait(); + yield undefined; + noPopStateExpected("no popstate during initial load"); + + locationEndsWith(popup, "good1.html"); + is(JSON.stringify(popup.history.state), '{"n":1,"ok":true}', + "Wrong state popped after going back to initial state."); + + // We're back at state 0, which was replaceState-ed to state1.html. Let's do + // some push/pop/replaces to make sure everything works OK when we involve + // large numbers of SHEntries. + for(var i = 2; i <= 30; i++) { + if (i % 3 == 0) { + popup.history.pushState({n:i, ok:true}, "state " + i, "good" + i + ".html"); + } + else { + popup.history.pushState({n:i}, "state " + i, "state" + i + ".html"); + for(var j = 0; j < i % 4; j++) { + popup.history.replaceState({n:i, nn:j}, "state " + i + ", " + j); + } + popup.history.replaceState({n:i, ok:true}, "state " + i, "good" + i + ".html"); + } + } + + for(var i = 29; i >= 1; i--) { + popup.history.back(); + popstateExpected("Didn't get a popstate on iteration " + i); + locationEndsWith(popup, "good" + i + ".html"); + is(gLastPopStateEvent.state.n, i, "Bad counter on last popstate event."); + ok(gLastPopStateEvent.state.ok, + "Last popstate event should have 'ok' set to true."); + } + + popup.close(); + + /** + * TEST 5 tests misc security features and implementation details of + * Push/ReplaceState + */ + + /* + * Test that we can't push/replace an object with a large (over 640k + * characters) JSON representation. + */ + + // (In case you're curious, this loop generates an object which serializes to + // 694581 characters.) + var bigObject = new Object(); + for(var i = 0; i < 51200; i++) { + bigObject[i] = i; + } + // statusMsg("Big object has size " + JSON.stringify(bigObject).length); + + // We shouldn't be able to pushstate this large object, due to space + // constraints. + expectException( + function() { iframeCw.history.pushState(bigObject, "foo"); }, + "pushState-ing large object"); + + expectException( + function() { iframeCw.history.replaceState(bigObject, "foo"); }, + "replaceState-ing large object"); + + /* + * Make sure we can't push/replace state on an iframe of a different origin. + * This will work if this function has requested Universal XPConnect + * privileges, so any code which needs those privileges can't be in this + * function. + */ + enableChildLoadCallback(); + iframeCw.location = "http://example.com"; + iframe.onload = onChildLoad; + yield undefined; + iframe.onload = null; + + expectException( + function() { iframeCw.history.pushState({}, "foo"); }, + "pushState-ing in a different origin"); + + expectException( + function() { iframeCw.history.replaceState({}, "foo"); }, + "replaceState-ing in a different origin"); + + /* + * If we do the following: + * * Start at page A. + * * PushState to page B. + * * Refresh. The server responds with a 404 + * * Go back. + * Then at the end, page A should be displayed, not the 404 page. + */ + enableChildLoadCallback(); + iframe.onload = onChildLoad; + iframeCw.location = "about:blank"; + yield undefined; + iframe.onload = null; + + enableChildLoadCallback(); + // navigate to http://mochi.test:8888/[...]/file_bug500328_1.html + iframeCw.location = innerLoc; + yield undefined; + + // PushState to a URL which doesn't exist + iframeCw.history.pushState({}, "", rand); + + // Refresh. We'll end up a 404 page. + iframe.onload = onChildLoad; + enableChildLoadCallback(); + iframeCw.location.reload(true); + yield undefined; + iframe.onload = null; + + // Since the last page was a 404, going back should actually show the + // contents of the old page, instead of persisting the contents of the 404 + // page. + enableChildPageShowCallback(); + iframeCw.history.back(); + yield undefined; + + // Make sure that we're actually showing the contents of + // file_bug500328_1.html, as opposed to the 404 page. + var identifierElem = iframeCw.document.getElementById("link-anchor1"); + ok(identifierElem != undefined && identifierElem != null, + "iframe didn't contain file_bug500328_1.html's contents."); + + /** + * TEST 6 tests that the referrer is set properly after push/replace states. + */ + + /* + * First, a simple test: + * * Load file_bug500328_1.html into iframe + * * PushState to newpage1.html#foo + * * Instruct the iframe to load file_bug500328_1.html into itself. + * The referer should be newpage1.html, without the hash. + * + * This also tests that we can call pushState from within the onload handler. + */ + enableChildLoadCallback(); + iframeCw.location = "file_bug500328_1.html"; + yield undefined; + + // Run within the onload handler. This should work without issue. + iframeCw.history.pushState(null, "", "newpage1.html"); + + // iframeCw.navigateTo() causes the iframe to set its location on our + // behalf. We can't just set its location ourselves, because then *we* + // become the referrer. + enableChildLoadCallback(); + iframeCw.navigateTo("file_bug500328_1.html"); + yield undefined; + + ok(iframeCw.document.referrer.toString().match(/newpage1.html$/), + "Wrong referrer after pushState. Expected newpage1.html, but was " + + iframeCw.document.referrer); + + /* + * We're back at file_bug500328_1.html. Now do the following: + * * replaceState to newpage2.html#foo + * * Click a link back to file_bug500328_1.html + * The referrer should be newpage2.html, without the hash. + */ + iframeCw.history.replaceState(null, null, "newpage2.html#foo"); + enableChildLoadCallback(); + sendMouseEvent({type:'click'}, 'link-self', iframeCw); + yield undefined; + + ok(iframeCw.document.referrer.toString().match(/newpage2.html$/), + "Wrong referrer after replaceState. Expected newpage2.html, but was " + + iframeCw.document.referrer); + + /* + * Set up a cycle with the popstate event to make sure it's properly + * collected. + */ + var evt = document.createEvent("popstateevent"); + evt.initEvent("foo", false, false, evt); + + /* */ + SimpleTest.finish(); + statusMsg("********** Finished tests ***********"); + while(true) + { + yield undefined; + + // I don't think this will actually make the mochitest fail, but there's + // not much we can do about this. Realistically, though, regressions are + // not likely to fire extra events -- this trap is here mostly to catch + // errors made while wriring tests. + ok(false, "Got extra event!"); + } + + /* + statusMsg("XXXXXXXXXXXXXX"); + while(true) { + yield undefined; + statusMsg("Woken up."); + } + */ +} + +// Important: Wait to start the tests until the page has loaded. Otherwise, +// the test will occasionally fail when it begins running before the iframes +// have finished their initial load of about:blank. +window.addEventListener('load', function() { + gGen = runTest(); + gGen.next(); +}, false); + +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_document_scripts.html b/dom/tests/mochitest/whatwg/test_document_scripts.html new file mode 100644 index 000000000..7e0e938c5 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_document_scripts.html @@ -0,0 +1,55 @@ +<!DOCTYPE HTML> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=685774 +--> +<head> + <title>Test for document.scripts (Bug 685774)</title> + <script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="application/javascript" src="/tests/SimpleTest/EventUtils.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=685774">Mozilla Bug 685774</a> +<script type="application/javascript"> + +/** Test for Bug 685774 **/ + +function testSameCollection(a, b, c) { + is(a.length, c, "unexpected count of script elements"); + is(b.length, c, "unexpected count of script elements"); + for (var i = 0; i < a.length; i++) { + is(a[i], b[i], "document.scripts is not supported"); + } +} + +SimpleTest.waitForExplicitFinish(); + +testSameCollection(document.scripts, document.getElementsByTagName("script"), 3); + +</script> +<script type="application/javascript"> + +testSameCollection(document.scripts, document.getElementsByTagName("script"), 4); + +function start() { + testSameCollection(document.scripts, document.getElementsByTagName("script"), 5); + + var e = document.createElement("script"); + testSameCollection(document.scripts, document.getElementsByTagName("script"), 5); + document.body.appendChild(e); + testSameCollection(document.scripts, document.getElementsByTagName("script"), 6); + + SimpleTest.finish(); +} + +addLoadEvent(start); + +</script> +<script type="application/javascript"> + +testSameCollection(document.scripts, document.getElementsByTagName("script"), 5); + +</script> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage.html b/dom/tests/mochitest/whatwg/test_postMessage.html new file mode 100644 index 000000000..ca6389790 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage.html @@ -0,0 +1,166 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>Basic postMessage tests</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://mochi.test:8888/tests/dom/tests/mochitest/whatwg/postMessage_helper.html" + name="otherSameDomain"></iframe> +<iframe src="http://example.org:8000/tests/dom/tests/mochitest/whatwg/postMessage_helper.html" + name="otherCrossDomain"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +/** Variable for receivers to attempt to get. */ +window.privateVariable = 17; + +/** For sentinel finish, if necessary in deficient browsers. */ +var finished = false; + +/** Ends testing if it isn't already done. */ +function finish() +{ + if (!finished) + { + finished = true; + SimpleTest.finish(); + } +} + +/** Receives MessageEvents. */ +function messageReceiver(evt) +{ + try + { + ok(evt instanceof MessageEvent, "umm, how did we get this?"); + is(evt.lastEventId, "", + "postMessage creates events with empty lastEventId"); + is(evt.type, "message", "expected events of type 'message'"); + + if (isMozilla) + { + ok(evt.isTrusted === false, "shouldn't have been a trusted event"); + } + + var data = evt.data; + + // Check for the message we send to ourselves; it can't be + // counted as a test, and it's conceptually distinct from + // the other cases, so just return after handling it. + if (data === "post-to-self") + { + respondToSelf(evt); + return; + } + + switch (evt.data) + { + case "post-to-self-response": + receiveSelf(evt); + break; + + case "post-to-other-same-domain-response": + receiveOtherSameDomain(evt); + break; + + case "post-to-other-cross-domain-response": + receiveOtherCrossDomain(evt); + + // All the tests have executed, so we're done. + finish(); + break; + + default: + ok(false, "unexpected message: " + evt.data); + finish(); + break; + } + } + catch (e) + { + ok(false, "error processing event with data '" + evt.data + "': " + e); + finish(); + } +} + + +/****************** + * SELF-RESPONDER * + ******************/ + +function respondToSelf(evt) +{ + is(evt.origin, "http://mochi.test:8888", "event has wrong origin"); + is(evt.source, window, "we posted this message!"); + + evt.source.postMessage("post-to-self-response", evt.origin); +} + + +/************* + * RECEIVERS * + *************/ + +function receiveSelf(evt) +{ + is(evt.origin, "http://mochi.test:8888", "event has wrong origin"); + is(evt.source, window, "we posted this message!"); + + window.frames.otherSameDomain.postMessage("post-to-other-same-domain", + "http://mochi.test:8888"); +} + +function receiveOtherSameDomain(evt) +{ + is(evt.origin, "http://mochi.test:8888", + "same-domain response event has wrong origin"); + is(evt.source, window.frames.otherSameDomain, + "wrong source for same-domain message!"); + + window.frames.otherCrossDomain.postMessage("post-to-other-cross-domain", + "http://example.org:8000"); +} + +function receiveOtherCrossDomain(evt) +{ + is(evt.origin, "http://example.org:8000", + "same-domain response event has wrong origin"); + + // can't use |is| here, because ok tries to get properties on its arguments + // for creating a formatted logging message + ok(evt.source === window.frames.otherCrossDomain, + "wrong source for cross-domain message!"); +} + + +/************** + * TEST SETUP * + **************/ + +function start() +{ + window.postMessage("post-to-self", "http://mochi.test:8888"); +} + +window.addEventListener("load", start, false); +window.addEventListener("message", messageReceiver, false); + +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_basehref.html b/dom/tests/mochitest/whatwg/test_postMessage_basehref.html new file mode 100644 index 000000000..f2d40e843 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_basehref.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=414815 +--> +<head> + <title>postMessage's interaction with a <base> tag</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> + <base href="http://example.com/" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=414815">Mozilla Bug 414815</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 414815 **/ + +SimpleTest.waitForExplicitFinish(); + +function receiveMessage(evt) +{ + is(evt.origin, "http://mochi.test:8888", "wrong sender"); + ok(evt.source === window, "wrong source"); + + is(evt.data, "generate-event", "wrong data"); + is(evt.lastEventId, "", "wrong lastEventId"); + + SimpleTest.finish(); +} + +window.addEventListener("message", receiveMessage, false); + +function run() +{ + window.postMessage("generate-event", "http://mochi.test:8888"); +} + +window.addEventListener("load", run, false); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_chrome.html b/dom/tests/mochitest/whatwg/test_postMessage_chrome.html new file mode 100644 index 000000000..e50ef6f09 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_chrome.html @@ -0,0 +1,114 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>postMessage chrome tests</title> + <script type="application/javascript" src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"></script> + <script type="application/javascript" src="chrome://mochikit/content/chrome-harness.js"></script> + <link rel="stylesheet" type="text/css" href="chrome://mochikit/content/tests/SimpleTest/test.css" /> +</head> +<body> + +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://example.org/tests/dom/tests/mochitest/whatwg/postMessage_chrome_helper.html" + name="contentDomain"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +var finished = false; +function finish() +{ + if (!finished) + { + finished = true; + SimpleTest.finish(); + } +} + +/** Receives MessageEvents to this window. */ +function messageReceiver(evt) +{ + ok(evt instanceof MessageEvent, "umm, how did we get this?"); + is(evt.type, "message", "expected events of type 'message'"); + is(evt.lastEventId, "", "postMessage creates events with empty lastEventId"); + + switch (evt.data) + { + case "path-is-set": + chromePathIsSet(evt); + break; + + case "post-to-self": + checkSelf(evt); + break; + + case "post-to-content-response": + receiveContent(evt); + break; + + default: + ok(false, "unexpected message: " + evt.data); + finish(); + break; + } +} + + +/****************** + * SELF-RESPONDER * + ******************/ + +function checkSelf(evt) +{ + var prepath = getChromePrePath(window.location.href); + + is(evt.isTrusted, true, "should have sent a trusted event"); + is(evt.origin, prepath, "wrong origin for chrome: URL"); + is(evt.source, null, "chrome posters get a null source, for security"); + + window.frames.contentDomain.postMessage(prepath, "*"); +} + + +function chromePathIsSet(evt) +{ + window.frames.contentDomain.postMessage("post-to-content", + "http://example.org"); +} + +/************* + * RECEIVERS * + *************/ + +function receiveContent(evt) +{ + is(evt.isTrusted, true, "should have sent a trusted event"); + finish(); +} + + +/************** + * TEST SETUP * + **************/ + +function run() +{ + window.addEventListener("message", messageReceiver, false); + window.postMessage("post-to-self", "*"); +} + +window.addEventListener("load", run, false); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_closed.html b/dom/tests/mochitest/whatwg/test_postMessage_closed.html new file mode 100644 index 000000000..5a6f3f928 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_closed.html @@ -0,0 +1,78 @@ +<!DOCTYPE html> +<html> +<head> + <title>postMessage's interaction with closed windows</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<p><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=417075">Bug 417075</a></p> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<div id="holder"></div> + +<pre id="test"> +<script class="testbody" type="application/javascript"> + +SimpleTest.waitForExplicitFinish(); + +function receiveMessage(evt) +{ + is(evt.origin, "http://mochi.test:8888", "wrong origin"); + ok(evt.source === openedWindow, "wrong source"); + is(evt.lastEventId, "", "postMessage creates events with empty lastEventId"); + + is(evt.data, "message", "wrong data"); + if (evt.data !== "message") + return; // prevent recursion if bugs + + evt.source.close(); + + function afterClose() + { + document.removeEventListener("message", receiveMessage, false); + evt.source.postMessage("NOT-RECEIVED", "*"); + + var iframe = document.createElement("iframe"); + iframe.id = "insertedIframe"; + $("holder").appendChild(iframe); + iframe.addEventListener("load", iframeLoaded, false); + iframe.src = "postMessage_closed_helper.html?parent"; + } + + setTimeout(afterClose, 0); +} + +window.addEventListener("message", receiveMessage, false); + +function iframeLoaded(evt) +{ + var iframe = $("insertedIframe"); + iframe.removeEventListener("load", iframeLoaded, false); + + var iframeWindow = iframe.contentWindow; + $("holder").removeChild($("insertedIframe")); + iframeWindow.postMessage("NOT-RECEIVED", "*"); + + SimpleTest.finish(); +} + +var openedWindow; + +function run() +{ + openedWindow = window.open("postMessage_closed_helper.html?opener", "foobar"); + if (!openedWindow) + { + ok(false, "this test must be run with popup blocking disabled"); + SimpleTest.finish(); + } +} + +window.addEventListener("load", run, false); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_hash.html b/dom/tests/mochitest/whatwg/test_postMessage_hash.html new file mode 100644 index 000000000..30996ef49 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_hash.html @@ -0,0 +1,45 @@ +<!DOCTYPE html> +<html> +<head> + <title>postMessage's interaction with hash URIs</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> + <base href="http://example.com/" /> +</head> +<body> +<p>(no bug; this is a preemptive test)</p> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://mochi.test:8888/tests/dom/tests/mochitest/whatwg/postMessage_hash.html#hash" + name="kid"></iframe> + +<pre id="test"> +<script class="testbody" type="application/javascript"> + +SimpleTest.waitForExplicitFinish(); + +function receiveMessage(evt) +{ + is(evt.origin, "http://mochi.test:8888", "wrong origin"); + ok(evt.source === window.frames.kid, "wrong source"); + is(evt.lastEventId, "", "postMessage creates events with empty lastEventId"); + + is(evt.data, "response-message", "wrong data"); + + SimpleTest.finish(); +} + +window.addEventListener("message", receiveMessage, false); + +function run() +{ + window.frames.kid.postMessage("from-parent", "http://mochi.test:8888"); +} + +window.addEventListener("load", run, false); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_idn.xhtml b/dom/tests/mochitest/whatwg/test_postMessage_idn.xhtml new file mode 100644 index 000000000..7c1178f26 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_idn.xhtml @@ -0,0 +1,71 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE html> +<html xmlns="http://www.w3.org/1999/xhtml"> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>postMessage uri/domain values and IDN encoding</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://sub1.ält.example.org:8000/tests/dom/tests/mochitest/whatwg/postMessage_idn_helper.html"></iframe> + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +var responseReceived = false; +var idnWindow = null; + +function receiveMessage(evt) +{ + ok(evt instanceof MessageEvent, "umm, how did we get this?"); + is(evt.type, "message", "expected events of type 'message'"); + + if (isMozilla) + { + ok(evt.isTrusted === false, "shouldn't have been a trusted event"); + } + + is(evt.origin, "http://sub1.ält.example.org:8000", + "wrong origin -- IDN issue, perhaps?"); + + is(evt.data, "idn-response", "unexpected test result"); + is(evt.lastEventId, "", "postMessage creates events with empty lastEventId"); + ok(evt.source === idnWindow, "wrong source"); + + SimpleTest.finish(); +} +window.addEventListener("message", receiveMessage, false); + +var xhtmlns = "http://www.w3.org/1999/xhtml"; + +function setup() +{ + var idnFrame = document.getElementsByTagNameNS(xhtmlns, "iframe")[0]; + idnWindow = idnFrame.contentWindow; + try + { + idnWindow.postMessage("idn-message", "http://sub1.ält.example.org:8000"); + } + catch (e) + { + ok(false, "failed to post message: " + e); + SimpleTest.finish(); + } +} + +addLoadEvent(setup); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_jar.html b/dom/tests/mochitest/whatwg/test_postMessage_jar.html new file mode 100644 index 000000000..3bc453921 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_jar.html @@ -0,0 +1,52 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=430251 +--> +<head> + <title>postMessage's interaction with pages at jar: URIs</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> + <base href="http://mochi.test:8888/" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=430251">Mozilla Bug 430251</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 430251 **/ + +SimpleTest.waitForExplicitFinish(); + +function receiveMessage(evt) +{ + is(evt.origin, "http://mochi.test:8888", "wrong sender"); + ok(evt.source === window.frames.kid, "wrong source"); + + is(evt.data, "finish-test", "wrong data"); + is(evt.lastEventId, "", "wrong lastEventId"); + + SimpleTest.finish(); +} + +window.addEventListener("message", receiveMessage, false); + +addLoadEvent(function() { + SpecialPowers.pushPrefEnv({"set": [["network.jar.block-remote-files", false]]}, function() { + var iframe = document.createElement('iframe'); + iframe.setAttribute('src', 'jar:http://mochi.test:8888/tests/dom/tests/mochitest/whatwg/postMessage.jar!/postMessage_jar.html'); + iframe.setAttribute('name', 'kid'); + document.getElementById("content").appendChild(iframe); + + iframe.onload = function() { + window.frames.kid.postMessage("start-test", "http://mochi.test:8888"); + } + }); +}); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_joined.html b/dom/tests/mochitest/whatwg/test_postMessage_joined.html new file mode 100644 index 000000000..034151a12 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_joined.html @@ -0,0 +1,58 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>postMessage with document.domain setting to join origins</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://sub1.test1.example.org/tests/dom/tests/mochitest/whatwg/postMessage_joined_helper.html" + name="container"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +function receiveTestResult(evt) +{ + ok(evt instanceof MessageEvent, "umm, how did we get this?"); + is(evt.type, "message", "expected events of type 'message'"); + + if (isMozilla) + { + ok(evt.isTrusted === false, "shouldn't have been a trusted event"); + } + + is(evt.lastEventId, "", "postMessage creates events with empty lastEventId"); + + // Either we passed the test or we failed it. The message's + // contents should help to diagnose the failure. Either way, + // consider this the end of the test. + is(evt.data, "test-passed", "unexpected test result"); + SimpleTest.finish(); +} + +function setup() +{ + window.addEventListener("message", receiveTestResult, false); + window.frames.container.postMessage("start-test", + "http://sub1.test1.example.org"); +} + +addLoadEvent(setup); + +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_onOther.html b/dom/tests/mochitest/whatwg/test_postMessage_onOther.html new file mode 100644 index 000000000..4cb4f98da --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_onOther.html @@ -0,0 +1,51 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>postMessage called through a different same-origin page</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://example.com/tests/dom/tests/mochitest/whatwg/postMessage_onOther.html" + name="topDomainFrame"></iframe> +<iframe src="http://test1.example.com/tests/dom/tests/mochitest/whatwg/postMessage_onOther.html" + name="subDomainFrame"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +/** Receives MessageEvents to this window. */ +function messageReceiver(evt) +{ + ok(evt instanceof MessageEvent, "wrong event type"); + is(evt.origin, "http://test1.example.com", "unexpected origin"); + is(evt.lastEventId, "", "postMessage creates events with empty lastEventId"); + is(evt.data, "test-finished", + "unexpected data in message"); + + SimpleTest.finish(); +} + +function run() +{ + window.frames.subDomainFrame.postMessage("start-test", + "http://test1.example.com"); +} + +window.addEventListener("message", messageReceiver, false); +window.addEventListener("load", run, false); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_origin.xhtml b/dom/tests/mochitest/whatwg/test_postMessage_origin.xhtml new file mode 100644 index 000000000..f6a919896 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_origin.xhtml @@ -0,0 +1,545 @@ +<!DOCTYPE html> +<html xmlns="http://www.w3.org/1999/xhtml"> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=417075 +--> +<head> + <title>postMessage from about:blank, data URLs</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=417075">Mozilla Bug 417075</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://mochi.test:8888/tests/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml" + id="sameDomain"></iframe> +<iframe src="http://example.com/tests/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml" + id="otherDomain"></iframe> +<iframe src="http://example.org:8000/tests/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml" + id="otherDomainPort"></iframe> +<iframe src="ftp://mochi.test:27534/tests/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml" + id="localNoExist"></iframe> + +<iframe src="http://sub1.παράδειγμα.δοκιμή/tests/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml" + id="idnKidWhitelist"></iframe> + +<iframe src="http://sub1.exaмple.test/tests/dom/tests/mochitest/whatwg/postMessage_origin_helper.xhtml" + id="idnKidNoWhitelist"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"><![CDATA[ +/** Test for Bug 417075 **/ + +SimpleTest.waitForExplicitFinish(); + +function errorCheck(i, called, error, actual) +{ + ok(!called, "receiver should not have been called for test #" + i); + is(actual, error, "wrong error thrown in test #" + i); +} + +var tests = + [ + // 0 + { + args: ["NOT-RECEIVED", ""], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + { + args: ["NOT-RECEIVED", "null"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + { + args: ["NOT-RECEIVED", "a"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + { + args: ["NOT-RECEIVED", "http :"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + { + args: ["NOT-RECEIVED", "http: //"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR, + + hasThrowsNoExceptionBug: true + }, + // 5 + { + args: ["NOT-RECEIVED", "http ://"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + { + args: ["TODO", " http://localhost:8888"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR, + + returnOrigin: "http://mochi.test:8888", + hasThrowsNoExceptionBug: true + }, + { + args: ["NOT-RECEIVED", "hä"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + { + args: ["NOT-RECEIVED", "http://lo\0k.com"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + { + args: ["NOT-RECEIVED", "http: //localhost:8888"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR, + + hasThrowsNoExceptionBug: true + }, + // 10 + { + args: ["NOT-RECEIVED", "http://localhost :8888"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + { + args: ["NOT-RECEIVED", "http:// localhost:8888"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR, + + hasThrowsNoExceptionBug: true + }, + { + args: ["TODO", "http://\nlocalhost:8888"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR, + + returnOrigin: "http://mochi.test:8888", + hasThrowsNoExceptionBug: true + }, + { + args: ["TODO", "http://localhost:8888\0"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR, + + returnOrigin: "http://mochi.test:8888", + hasThrowsNoExceptionBug: true + }, + { + args: ["TODO", "http://localhost:8888\n"], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR, + + returnOrigin: "http://mochi.test:8888", + hasThrowsNoExceptionBug: true + }, + // 15 + { + args: ["PASS", "*"], + source: "sameDomain", + returnOrigin: "http://mochi.test:8888" + }, + { + args: ["PASS", "http://mochi.test:8888"], + source: "sameDomain", + returnOrigin: "http://mochi.test:8888" + }, + { + args: ["PASS", "http://example.com"], + source: "otherDomain", + returnOrigin: "http://example.com" + }, + { + args: ["PASS", "http://example.com/"], + source: "otherDomain", + returnOrigin: "http://example.com" + }, + { + args: ["PASS", "http://example.com:80"], + source: "otherDomain", + returnOrigin: "http://example.com" + }, + // 20 + { + args: ["PASS", "http://example.com:80/"], + source: "otherDomain", + returnOrigin: "http://example.com" + }, + { + args: ["PASS", "http://example.com:80/foobar"], + source: "otherDomain", + returnOrigin: "http://example.com" + }, + { + args: ["PASS", "http://example.com/foobar"], + source: "otherDomain", + returnOrigin: "http://example.com" + }, + { + args: ["PASS", "http://example.com:8000"], + source: "otherDomain", + expectNoCallback: true + }, + { + args: ["PASS", "http://example.com:8000/"], + source: "otherDomain", + expectNoCallback: true + }, + // 25 + { + args: ["PASS", "http://example.org:8000"], + source: "otherDomainPort", + returnOrigin: "http://example.org:8000" + }, + { + args: ["PASS", "http://example.org:8000/"], + source: "otherDomainPort", + returnOrigin: "http://example.org:8000" + }, + { + args: ["PASS", "http://example.org:8000/tests/dom/test/mochitest/whatwg/postMessage_origin_helper.xhtml"], + source: "otherDomainPort", + returnOrigin: "http://example.org:8000" + }, + { + args: ["PASS", "http://example.org:8000/tests/dom/test/mochitest/whatwg/this_file_does_not_exist.xhtml"], + source: "otherDomainPort", + returnOrigin: "http://example.org:8000" + }, + { + args: ["PASS", "http://example.org"], + source: "otherDomainPort", + expectNoCallback: true + }, + // 30 + { + args: ["PASS", "http://example.org:80"], + source: "otherDomainPort", + expectNoCallback: true + }, + { + args: ["PASS", "http://example.org/"], + source: "otherDomainPort", + expectNoCallback: true + }, + { + args: ["PASS", "http://example.org"], + source: "otherDomain", + expectNoCallback: true + }, + { + args: ["PASS", "ftp://mochi.test:8888"], + source: "sameDomain", + expectNoCallback: true + }, + { + args: ["PASS", "http://mochi.test:8888"], + source: "sameDomain", + returnOrigin: "http://mochi.test:8888" + }, + // 35 + { + args: ["PASS", "http://mochi.test:27534"], + source: "sameDomain", + expectNoCallback: true + }, + { + args: ["PASS", "http://sub1.παράδειγμα.δοκιμή"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + { + args: ["PASS", "http://sub1.παράδειγμα.δοκιμή:80"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + { + args: ["PASS", "http://sub1.παράδειγμα.δοκιμή:80/"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + { + args: ["PASS", "http://sub1.παράδειγμα.δοκιμή:80/foobar"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + // 40 + { + args: ["PASS", "http://sub1.παράδειγμα.δοκιμή/foobar"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + { + args: ["PASS", "http://sub1.xn--hxajbheg2az3al.xn--jxalpdlp"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + { + args: ["PASS", "http://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:80"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + { + args: ["PASS", "http://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:80/"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + { + args: ["PASS", "http://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:80/foo"], + source: "idnKidWhitelist", + returnOrigin: "http://sub1.παράδειγμα.δοκιμή" + }, + // 45 + { + args: ["PASS", "http://sub1.exaмple.test"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + { + args: ["PASS", "http://sub1.exaмple.test:80"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + { + args: ["PASS", "http://sub1.exaмple.test:80/"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + { + args: ["PASS", "http://sub1.exaмple.test/"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + { + args: ["PASS", "http://sub1.exaмple.test/foobar"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + // 50 + { + args: ["PASS", "http://sub1.xn--exaple-kqf.test"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + { + args: ["PASS", "http://sub1.xn--exaple-kqf.test:80"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + { + args: ["PASS", "http://sub1.xn--exaple-kqf.test:80/"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + { + args: ["PASS", "http://sub1.xn--exaple-kqf.test/"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + { + args: ["PASS", "http://sub1.xn--exaple-kqf.test/foobar"], + source: "idnKidNoWhitelist", + returnOrigin: "http://sub1.exaмple.test", + + hasWrongReturnOriginBug: true + }, + // 55 + { + args: ["NOT-RECEIVED", undefined], + source: "sameDomain", + name: "SyntaxError", + code: DOMException.SYNTAX_ERR + }, + ]; + +function allTests(callback) +{ + var test, target, called; + + function eventCheck(evt) + { + ok(test === tests[i], + "i and test are out of sync! async is hard, let's go shopping"); + + var originCheck = test.hasWrongReturnOriginBug ? todo_is : is; + originCheck(evt.origin, test.returnOrigin, "wrong origin for #" + i); + if (test.args[0] == "TODO") + todo_is(evt.data, "PASS", "wrong data"); + else + is(evt.data, "PASS", "wrong data"); + is(evt.lastEventId, "", + "postMessage creates events with empty lastEventId"); + ok(evt.source === target, "wrong source"); + called = true; + } + + function nextTest() + { + i++; + + if (i === end) + { + removeListener(listener); + + setTimeout(callback, 0); + return; + } + + test = tests[i]; + + target = $(test.source).contentWindow; + try + { + called = false; + target.postMessage.apply(target, test.args); + } + catch (e) + { + // Since an exception was thrown, we know at this point that we're not + // waiting on anything else in the queue of script to run, and we can just + // call nextTest directly. + errorCheck(i, called, e.name, test.name); + errorCheck(i, called, e.code, test.code); + nextTest(); + return; + } + + // We've set up the event generated by postMessage to be dispatched, and + // it's sitting in a queue somewhere. However, it hasn't arrived yet, and + // the target document hasn't received the event -- so we need to continue + // our tests later. + setTimeout(function() + { + // The event was dispatched, and the target frame's code processed it and + // responded -- so now *that* response is sitting in the queue of script to + // execute. Process pending script one more time so we know we've gotten + // the response. + setTimeout(function() + { + // Finally, we've posted our message and received our response, and + // there's nothing further coming down the pipe. + if (test.hasThrowsNoExceptionBug) + todo(false, "should throw on test #" + i); + else + ok(test.expectNoCallback ^ called, "should have been called #" + i); + + nextTest(); + }, 0); + }, 0); + } + + var listener = registerMessageListener(eventCheck); + + var i = -1, end = tests.length; + nextTest(); +} + +function registerMessageListener(func, callback) +{ + function receive(evt) + { + func(evt); + if (callback) + callback(); + } + + window.addEventListener("message", receive, false); + + return receive; +} + +function removeListener(listener) +{ + window.removeEventListener("message", listener, false); +} + +function oddballTests(callback) +{ + var called = false; + + function eventChecks(evt) + { + is(evt.origin, "http://mochi.test:8888", "wrong sender"); + is(evt.data, "PASS", "wrong data"); + is(evt.lastEventId, "", + "postMessage creates events with empty lastEventId"); + ok(evt.source === window, "wrong source"); + called = true; + } + + var listener = registerMessageListener(eventChecks, function() + { + is(called, true, "should have been called"); + removeListener(listener); + + called = false; + listener = registerMessageListener(eventChecks, function() + { + is(called, true, "should have been called"); + + removeListener(listener); + callback(); + }); + + window.postMessage("PASS", "http://mochi.test:8888"); + }); + + window.postMessage("PASS", "http://mochi.test:8888"); +} + +function run() +{ + oddballTests(function() + { + allTests(function() + { + SimpleTest.finish(); + }); + }); +} + +window.addEventListener("load", run, false); +]]></script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_override.html b/dom/tests/mochitest/whatwg/test_postMessage_override.html new file mode 100644 index 000000000..a776ccebe --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_override.html @@ -0,0 +1,103 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>postMessage override test</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://example.org:8000/tests/dom/tests/mochitest/whatwg/postMessage_override_helper.html"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +var count = 0; + +function test(callback) +{ + try + { + count++; + switch (count) + { + case 1: + window.frames[0].postMessage("PASS 1", "http://example.org:8000"); + break; + + case 2: + window.frames[0].postMessage("PASS 2", "http://example.org:8000"); + break; + + default: + ok(false, "unexpected"); + } + } + catch (e) + { + ok(false, "error running test " + count + ": " + e); + } + + // Waiting for sent postMessage event to be processed... + setTimeout(function() + { + // Waiting for responding postMessage event to be processed... + setTimeout(function() + { + // We have our response! + callback(); + }, 0); + }, 0); +} + +function messageReceiver(evt) +{ + var expect; + + switch (count) + { + case 1: + expect = "PASS 1"; + break; + + case 2: + expect = "PASS 2"; + break; + + default: + expect = "unexpected"; + break; + } + + is(evt.data, expect, + "uh-oh, we (" + count + ") didn't get the right postMessage!"); +} + +window.addEventListener("message", messageReceiver, false); + +function run() +{ + test(function() + { + test(function() + { + SimpleTest.finish(); + }, 0); + }); +} + +window.addEventListener("load", run, false); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_special.xhtml b/dom/tests/mochitest/whatwg/test_postMessage_special.xhtml new file mode 100644 index 000000000..bf443af99 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_special.xhtml @@ -0,0 +1,311 @@ +<!DOCTYPE html> +<html xmlns="http://www.w3.org/1999/xhtml"> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>postMessage from about:blank, data URLs</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<pre id="test"> +<script class="testbody" type="application/javascript"><![CDATA[ +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +var B64_CHARS = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; + +/** + * Encodes an array of bytes into a string using the base 64 encoding scheme. + * + * @param bytes + * An array of bytes to encode. + */ +function b64(str) +{ + var byteArray = new Array(str.length); + for (var i = 0, sz = str.length; i < sz; i++) + byteArray[i] = str.charCodeAt(i); + + var index = 0; + function get3Bytes() + { + if (byteArray.length - index < 3) + return null; // Less than three bytes remaining + + // Return the next three bytes in the array, and increment index for our + // next invocation + return byteArray.slice(index, index += 3); + } + + var out = ""; + var bytes = null; + while ((bytes = get3Bytes())) + { + var bits = 0; + for (var i = 0; i < 3; i++) + bits = (bits << 8) | bytes[i]; + for (var j = 18; j >= 0; j -= 6) + out += B64_CHARS[(bits>>j) & 0x3F]; + } + + // Get the remaining bytes + bytes = byteArray.slice(index); + + switch (bytes.length) + { + case 2: + out += B64_CHARS[(bytes[0]>>2) & 0x3F] + + B64_CHARS[((bytes[0] & 0x03) << 4) | ((bytes[1] >> 4) & 0x0F)] + + B64_CHARS[((bytes[1] & 0x0F) << 2)] + + "="; + break; + case 1: + out += B64_CHARS[(bytes[0]>>2) & 0x3F] + + B64_CHARS[(bytes[0] & 0x03) << 4] + + "=="; + break; + } + + return out; +} + + +var aboutBlankWindow = null; +var aboutBlank2Window = null; +var dataWindow = null; + +/** Convert a nullable string to a pretty representation */ +function sourceify(v) +{ + if (typeof v == "string") + return "'" + v + "'"; + return String(v); +} + +/** Receives MessageEvents to this window. */ +function messageReceiver(evt) +{ + // It's not clear what the security model is for data: URLs and whether they + // can access their parents; WebKit denies access, while Gecko currently + // allows it. We work around this problem by using postMessage (surprise!) + // to start the round of tests when each iframe loads. + if (evt.data === "next-test") + { + setTimeout(nextTest, 0); + return; + } + + + try + { + ok(evt instanceof MessageEvent, "umm, how did we get this?"); + is(evt.type, "message", "expected events of type 'message'"); + + if (isMozilla) + { + ok(evt.isTrusted === false, "shouldn't have been a trusted event"); + } + + if (evt.data === "about:blank-response") + { + // This isn't clarified in HTML5 yet, but the origin for a document which + // has been open()ed is the origin of the calling code, somewhat loosely + // speaking. For the specific case of about:blank it's also possible + // that the origin is determined by the code that opens the window. It's + // not codified yet which of these two causes the identifier tokens on + // the event generated by the new window to be those of this window, but + // in either case this is what they should be. + is(evt.origin, "http://mochi.test:8888", + "wrong origin for event from about:blank"); + is(evt.source, aboutBlankWindow, "wrong source"); + + // ...and onto the next test + setupBlank2(); + } + else if (evt.data === "about:blank2-response") + { + is(evt.origin, "http://mochi.test:8888", + "wrong origin for event from about:blank #2"); + is(evt.source, aboutBlank2Window, "wrong source"); + + setupData(); + } + else if (evt.data === "data-response") + { + // HTML5 defines the origin of a data: URI as the origin of the window or + // script that opened the data: URI. + is(evt.origin, "http://mochi.test:8888", + "wrong origin for event from data URL (should be the origin of the " + + "window/script that opened the URL, in this case the origin of this " + + "file)"); + is(evt.source, dataWindow, "wrong source"); + + finish(); + } + else + { + ok(false, "unexpected message: " + evt.data); + } + } + catch (e) + { + ok(false, "error processing event with data '" + evt.data + "': " + e); + } +} + +function getContents(description, responseText) +{ + var contents = + "<!DOCTYPE html>\n" + + "<html>\n" + + "<head>\n" + + " <title>about:blank</title>\n" + + " <script type='application/javascript'>\n" + + "function receive(evt)\n" + + "{\n" + + " var response = '" + responseText + "';\n" + + "\n" + + " if (evt.source !== window.parent)\n" + + " response += ' wrong-source';\n" + + " if (evt.origin !== 'http://mochi.test:8888')\n" + + " response += ' wrong-origin(' + evt.origin + ')';\n" + + " if (evt.data !== 'from-opener')\n" + + " response += ' wrong-data(' + evt.data + ')';\n" + + "\n" + + " window.parent.postMessage(response, 'http://mochi.test:8888');\n" + + "}\n" + + "\n" + + "function ready()\n" + + "{\n" + + " window.parent.postMessage('next-test', 'http://mochi.test:8888');\n" + + "}\n" + + "\n" + + "window.addEventListener('load', ready, false);\n" + + "window.addEventListener('message', receive, false);\n" + + " </script>\n" + + "</head>\n" + + "<body><p>" + description + "</p></body>\n" + + "</html>"; + + return contents; +} + +function finish() +{ + SimpleTest.finish(); +} + +var xhtmlns = "http://www.w3.org/1999/xhtml"; + +function insert(el) +{ + var content = $("content"); + content.parentNode.insertBefore(el, content); +} + +function setupBlank() +{ + var aboutBlankFrame = document.createElementNS(xhtmlns, "iframe"); + aboutBlankFrame.setAttribute("src", "about:blank"); + insert(aboutBlankFrame); + + aboutBlankWindow = aboutBlankFrame.contentWindow; + var doc = aboutBlankWindow.document; + doc.open(); + doc.write(getContents("This was about:blank #1", "about:blank-response")); + doc.close(); + + // I don't believe anything guarantees sync parsing, so we have to wait for + // the new window to poke us to actually do the test. :-\ +} + +function setupBlank2() +{ + var aboutBlank2Frame = document.createElementNS(xhtmlns, "iframe"); + aboutBlank2Frame.addEventListener("load", nextTest, false); + aboutBlank2Frame.setAttribute("src", "about:blank"); + + insert(aboutBlank2Frame); +} + +// Could use window.btoa here, but that's not standardized, and we want to be +// able to run these tests against browsers that don't support it. +var dataURI = "data:text/html;base64," + + b64(getContents("A data: URL", "data-response")); + +function setupData() +{ + var dataFrame = document.createElementNS(xhtmlns, "iframe"); + dataFrame.setAttribute("src", dataURI); + insert(dataFrame); + + dataWindow = dataFrame.contentWindow; + + // ...and wait again for the window to load... +} + +var count = 0; +function nextTest() +{ + switch (count++) + { + case 0: + testBlank(); + break; + + case 1: + testBlank2(); + break; + + case 2: + testData(); + break; + + default: + ok(false, "unreached"); + break; + } +} + +function testBlank() +{ + aboutBlankWindow.postMessage("from-opener", "http://mochi.test:8888"); +} + +function testBlank2() +{ + // For some reason we can't access this across browsers prior to the iframe + // loading, so set its value here. + aboutBlank2Window = window.frames[1]; + + var doc = aboutBlank2Window.document; + + doc.body.textContent = "This was about:blank #2"; + + var script = doc.createElement("script"); + script.textContent = + "window.parent.postMessage('about:blank2-response', " + + " 'http://mochi.test:8888');"; + doc.body.appendChild(script); +} + +function testData() +{ + dataWindow.postMessage("from-opener", "http://mochi.test:8888"); +} + +window.addEventListener("message", messageReceiver, false); + +addLoadEvent(setupBlank); +]]></script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_structured_clone.html b/dom/tests/mochitest/whatwg/test_postMessage_structured_clone.html new file mode 100644 index 000000000..ec0941227 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_structured_clone.html @@ -0,0 +1,68 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=553125 +--> +<head> + <title>postMessage uses structured clone</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="application/javascript;version=1.7" + src="postMessage_structured_clone_helper.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=553125">Mozilla Bug 553125</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://mochi.test:8888/tests/dom/tests/mochitest/whatwg/postMessage_structured_clone_helper.html" + name="sameDomain"></iframe> +<iframe src="http://example.org:8000/tests/dom/tests/mochitest/whatwg/postMessage_structured_clone_helper.html" + name="crossDomain"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 553125 **/ + +SimpleTest.waitForExplicitFinish(); + +var lastMessage = null; +var crossOrigin = false; +var generator = new getTestContent(); + +function runNextSameOrigin() { + try { + lastMessage = generator.next(); + } catch (e) { + generator = new getTestContent(); + crossOrigin = true; + runNextCrossOrigin(); + } + window.frames.sameDomain.postMessage(lastMessage, "http://mochi.test:8888"); +} + +function runNextCrossOrigin() { + try { + lastMessage = generator.next(); + } catch (e) { + SimpleTest.finish(); + } + window.frames.crossDomain.postMessage(lastMessage, "http://example.org:8000"); +} + +function receiveMessage(evt) { + if (evt.data == "TEST-PASS") + SimpleTest.ok(true, "structured clone of | " + lastMessage + " | succeeded"); + else + SimpleTest.ok(false, "structured clone of | " + lastMessage + " | failed"); + setTimeout(crossOrigin ? runNextCrossOrigin : runNextSameOrigin, 0); +} + +window.addEventListener("message", receiveMessage, false); +window.addEventListener("load", runNextSameOrigin, false); + +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_throw.html b/dom/tests/mochitest/whatwg/test_postMessage_throw.html new file mode 100644 index 000000000..90391e78f --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_throw.html @@ -0,0 +1,74 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage +--> +<head> + <title>postMessage with a thrown exception</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=postMessage">Mozilla Bug 387706</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://mochi.test:8888/tests/dom/tests/mochitest/whatwg/postMessage_throw_helper.html" + name="sameDomain"></iframe> +<iframe src="http://example.org:8000/tests/dom/tests/mochitest/whatwg/postMessage_throw_helper.html" + name="crossDomain"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 387706 **/ + +SimpleTest.waitForExplicitFinish(); + +function atLoad() +{ + try + { + sameDomain.postMessage("foo", "http://mochi.test:8888"); + ok(true, "should not have thrown for same-domain exception"); + } + catch (e) + { + ok(false, "uh-oh, threw a same-domain exception: " + e); + } + + setTimeout(next, 0); +} + +function next() +{ + ok(true, "no pending-exception wackiness for same-domain"); + setTimeout(next2, 0); +} + +function next2() +{ + try + { + crossDomain.postMessage("foo", "http://example.org:8000"); + ok(true, "should not have thrown for cross-domain exception"); + } + catch (e) + { + ok(false, "uh-oh, threw a cross-domain exception: " + e); + } + + setTimeout(next3, 0); +} + +function next3() +{ + ok(true, "no pending-exception wackiness for cross-domain"); + SimpleTest.finish(); +} + +addLoadEvent(atLoad); +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_transfer.html b/dom/tests/mochitest/whatwg/test_postMessage_transfer.html new file mode 100644 index 000000000..996a04f51 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_transfer.html @@ -0,0 +1,62 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=822094 +--> +<head><meta charset=utf-8> + <title>postMessage transferable tests</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <script type="text/javascript" src="browserFu.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=822094">Mozilla Bug 822094</a> +<p id="display"></p> +<div id="content" style="display: none"> + +<iframe src="postMessage_transfer_helper.html" + name="sameDomain"></iframe> +<iframe src="http://example.org:8000/tests/dom/tests/mochitest/whatwg/postMessage_transfer_helper.html" + name="crossDomain"></iframe> + +</div> +<pre id="test"> +<script class="testbody" type="application/javascript"> + +SimpleTest.waitForExplicitFinish(); + +var tests = [ + function() { testFunc(window, "http://mochi.test:8888"); }, + function() { testFunc(frames.sameDomain, "http://mochi.test:8888"); }, + function() { testFunc(frames.crossDomain, "http://example.org:8000"); }, + function() { SimpleTest.finish(); }, +]; + +function testFunc(target, origin) { + var ab = new ArrayBuffer(1); + var cd = new ArrayBuffer(1); + + target.postMessage([ab, cd], origin, [ab]); + is(ab.byteLength, 0, "ab should be detached"); + is(cd.byteLength, 1, "cd should not be detached"); + + onmessage = function(e) { + is(e.data[0].byteLength, 1, "ab should be transfered"); + is(e.data[1].byteLength, 1, "cd should be cloned"); + nextTest(); + }; +} + +function nextTest() { + var t = tests.shift(); + t(); +}; + +onload = function() { + nextTest(); +}; + +</script> +</pre> +</body> +</html> diff --git a/dom/tests/mochitest/whatwg/test_postMessage_userpass.html b/dom/tests/mochitest/whatwg/test_postMessage_userpass.html new file mode 100644 index 000000000..d0cd7d5d5 --- /dev/null +++ b/dom/tests/mochitest/whatwg/test_postMessage_userpass.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<html> +<!-- +https://bugzilla.mozilla.org/show_bug.cgi?id=417075 +--> +<head> + <title>postMessage from a page with username/password in its URI</title> + <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> + <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> +</head> +<body> +<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=417075">Mozilla Bug 417075</a> +<p id="display"></p> +<div id="content" style="display: none"></div> + +<iframe src="http://bobhope:password@example.org/tests/dom/tests/mochitest/whatwg/postMessage_userpass_helper.html" + name="userPassKid"></iframe> + + +<pre id="test"> +<script class="testbody" type="application/javascript"> +/** Test for Bug 417075 **/ + +SimpleTest.waitForExplicitFinish(); + +function receiveMessage(evt) +{ + is(evt.origin, "http://example.org", "wrong origin"); + is(evt.data, "child-message", "wrong data"); + is(evt.lastEventId, "", "postMessage creates events with empty lastEventId"); + ok(evt.source === window.frames.userPassKid, "wrong source"); + SimpleTest.finish(); +} + +window.addEventListener("message", receiveMessage, false); + +function sendMessage(evt) +{ + window.frames.userPassKid.postMessage("parent-message", "http://example.org"); +} + +window.addEventListener("load", sendMessage, false); +</script> +</pre> +</body> +</html> |