diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /testing/web-platform/tests/mixed-content/generic/mixed-content-test-case.js | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'testing/web-platform/tests/mixed-content/generic/mixed-content-test-case.js')
-rw-r--r-- | testing/web-platform/tests/mixed-content/generic/mixed-content-test-case.js | 163 |
1 files changed, 163 insertions, 0 deletions
diff --git a/testing/web-platform/tests/mixed-content/generic/mixed-content-test-case.js b/testing/web-platform/tests/mixed-content/generic/mixed-content-test-case.js new file mode 100644 index 000000000..7f3a7bfa9 --- /dev/null +++ b/testing/web-platform/tests/mixed-content/generic/mixed-content-test-case.js @@ -0,0 +1,163 @@ +/** + * @fileoverview Test case for mixed-content in Web Platform Tests. + * @author burnik@google.com (Kristijan Burnik) + */ + +/** + * MixedContentTestCase exercises all the tests for checking browser behavior + * when resources regarded as mixed-content are requested. A single run covers + * only a single scenario. + * @param {object} scenario A JSON describing the test arrangement and + * expectation(s). Refer to /mixed-content/spec.src.json for details. + * @param {string} description The test scenario verbose description. + * @param {SanityChecker} sanityChecker Instance of an object used to check the + * running scenario. Useful in debug mode. See ./sanity-checker.js. + * Run {@code ./tools/generate.py -h} for info on test generating modes. + * @return {object} Object wrapping the start method used to run the test. + */ +function MixedContentTestCase(scenario, description, sanityChecker) { + var httpProtocol = "http"; + var httpsProtocol = "https"; + var wsProtocol = "ws"; + var wssProtocol = "wss"; + + var sameOriginHost = location.hostname; + var crossOriginHost = "{{domains[www1]}}"; + + // These values can evaluate to either empty strings or a ":port" string. + var httpPort = getNormalizedPort(parseInt("{{ports[http][0]}}", 10)); + var httpsPort = getNormalizedPort(parseInt("{{ports[https][0]}}", 10)); + var wsPort = getNormalizedPort(parseInt("{{ports[ws][0]}}", 10)); + var wssPort = getNormalizedPort(parseInt("{{ports[wss][0]}}", 10)); + + var resourcePath = "/mixed-content/generic/expect.py"; + var wsResourcePath = "/stash_responder"; + + // Map all endpoints to scenario for use in the test. + var endpoint = { + "same-origin": + location.origin + resourcePath, + "same-host-https": + httpsProtocol + "://" + sameOriginHost + httpsPort + resourcePath, + "same-host-http": + httpProtocol + "://" + sameOriginHost + httpPort + resourcePath, + "cross-origin-https": + httpsProtocol + "://" + crossOriginHost + httpsPort + resourcePath, + "cross-origin-http": + httpProtocol + "://" + crossOriginHost + httpPort + resourcePath, + "same-host-wss": + wssProtocol + "://" + sameOriginHost + wssPort + wsResourcePath, + "same-host-ws": + wsProtocol + "://" + sameOriginHost + wsPort + wsResourcePath, + "cross-origin-wss": + wssProtocol + "://" + crossOriginHost + wssPort + wsResourcePath, + "cross-origin-ws": + wsProtocol + "://" + crossOriginHost + wsPort + wsResourcePath + }; + + // Mapping all the resource requesting methods to the scenario. + var resourceMap = { + "a-tag": requestViaAnchor, + "area-tag": requestViaArea, + "fetch-request": requestViaFetch, + "form-tag": requestViaForm, + "iframe-tag": requestViaIframe, + "img-tag": requestViaImage, + "script-tag": requestViaScript, + "worker-request": requestViaWorker, + "xhr-request": requestViaXhr, + "audio-tag": requestViaAudio, + "video-tag": requestViaVideo, + "picture-tag": requestViaPicture, + "object-tag": requestViaObject, + "link-css-tag": requestViaLinkStylesheet, + "link-prefetch-tag": requestViaLinkPrefetch, + "websocket-request": requestViaWebSocket + }; + + sanityChecker.checkScenario(scenario, resourceMap); + + // Mapping all expected MIME types to the scenario. + var contentType = { + "a-tag": "text/html", + "area-tag": "text/html", + "fetch-request": "application/json", + "form-tag": "text/html", + "iframe-tag": "text/html", + "img-tag": "image/png", + "script-tag": "text/javascript", + "worker-request": "application/javascript", + "xhr-request": "application/json", + "audio-tag": "audio/mpeg", + "video-tag": "video/mp4", + "picture-tag": "image/png", + "object-tag": "text/html", + "link-css-tag": "text/css", + "link-prefetch-tag": "text/html", + "websocket-request": "application/json" + }; + + var mixed_content_test = async_test(description); + + function runTest() { + sanityChecker.setFailTimeout(mixed_content_test); + + var key = guid(); + var value = guid(); + // We use the same path for both HTTP/S and WS/S stash requests. + var stash_path = encodeURIComponent("/mixed-content"); + var announceResourceRequestUrl = endpoint['same-origin'] + + "?action=put&key=" + key + + "&value=" + value + + "&path=" + stash_path; + var assertResourceRequestUrl = endpoint['same-origin'] + + "?action=take&key=" + key + + "&path=" + stash_path; + var resourceRequestUrl = endpoint[scenario.origin] + "?redirection=" + + scenario.redirection + "&action=purge&key=" + key + + "&path=" + stash_path + "&content_type=" + + contentType[scenario.subresource]; + + xhrRequest(announceResourceRequestUrl) + .then(function(response) { + // Send out the real resource request. + // This should tear down the key if it's not blocked. + return resourceMap[scenario.subresource](resourceRequestUrl); + }) + .then(function() { + mixed_content_test.step(function() { + assert_equals("allowed", scenario.expectation, + "The triggered event should match '" + + scenario.expectation + "'."); + }, "Check if success event was triggered."); + + // Send request to check if the key has been torn down. + return xhrRequest(assertResourceRequestUrl); + }, function(error) { + mixed_content_test.step(function() { + assert_equals("blocked", scenario.expectation, + "The triggered event should match '" + + scenario.expectation + "'."); + // TODO(kristijanburnik): param "error" can be an event or error. + // Map assertion by resource. + // e.g.: assert_equals(e.type, "error"); + }, "Check if error event was triggered."); + + // When requestResource fails, we also check the key state. + return xhrRequest(assertResourceRequestUrl); + }) + .then(function(response) { + // Now check if the value has been torn down. If it's still there, + // we have blocked the request to mixed-content. + mixed_content_test.step(function() { + assert_equals(response.status, scenario.expectation, + "The resource request should be '" + scenario.expectation + + "'."); + }, "Check if request was sent."); + mixed_content_test.done(); + }); + + } // runTest + + return {start: runTest}; +} // MixedContentTestCase |