diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /testing/web-platform/tests/secure-contexts/shared-worker-insecure-first.https.html | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'testing/web-platform/tests/secure-contexts/shared-worker-insecure-first.https.html')
-rw-r--r-- | testing/web-platform/tests/secure-contexts/shared-worker-insecure-first.https.html | 111 |
1 files changed, 111 insertions, 0 deletions
diff --git a/testing/web-platform/tests/secure-contexts/shared-worker-insecure-first.https.html b/testing/web-platform/tests/secure-contexts/shared-worker-insecure-first.https.html new file mode 100644 index 000000000..074b21c10 --- /dev/null +++ b/testing/web-platform/tests/secure-contexts/shared-worker-insecure-first.https.html @@ -0,0 +1,111 @@ +<!doctype html> +<html> + <head> + <meta charset=utf-8> + <title>Test SharedWorkerGlobalScope.isSecureContext for HTTP creator</title> + <meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object"> + <script src=/resources/testharness.js></script> + <script src=/resources/testharnessreport.js></script> + <script src="server-locations.sub.js"></script> + </head> + <body> + <script> + /* + * The goal of this test is to check that we do the right thing if the + * same SharedWorker is used first from an insecure context and then from + * a secure context. + * + * To do this, we first open an insecure (http) popup, which loads a + * subframe that is same-origin with us but not a secure context, since + * its parent is http, not https. Then this subframe loads a SharedWorker + * and communicates back to us whether that worker and a child dedicated + * worker it spawns think they are secure contexts. Async tests t3 and t4 + * track these two workers. + * + * After we have heard from both workers in the popup, we directly load + * the same exact subframe ourselves and see what the workers in it + * report. Async tests t1 and t2 track these two workers. + */ + var t1 = async_test("Shared worker in subframe"); + var t2 = async_test("Nested worker in shared worker in subframe"); + var t3 = async_test("Shared worker in popup"); + var t4 = async_test("Nested worker from shared worker in popup"); + + var messageCount = 0; + var popup = null; + onmessage = function(e) { + ++messageCount; + // Make sure to not close the popup until we've run the iframe part of + // the test! We need to keep those shared workers alive. + if (messageCount == 4 && popup) { + popup.close(); + } + var data = e.data; + if (data.type == "shared") { + // This is a message from our shared worker; check whether it's the + // one in the popup or in our subframe. + if (data.fromPopup) { + t3.step(function() { + assert_false(data.exception); + assert_false(data.error); + assert_false(data.isSecureContext); + }); + t3.done(); + } else { + t1.step(function() { + assert_false(data.exception); + assert_true(data.error); + }); + t1.done(); + } + } else if (data.type == "nested") { + // This is a message from our shared worker's nested dedicated worker; + // check whether it's the one in the popup or in our subframe. + if (data.fromPopup) { + t4.step(function() { + assert_false(data.exception); + assert_false(data.error); + assert_false(data.isSecureContext); + }); + t4.done(); + } else { + t2.step(function() { + assert_false(data.exception); + assert_true(data.error); + }); + t2.done(); + } + } else { + if (popup) { + popup.close(); + } + t1.step(function() { + assert_unreached("Unknown message"); + }); + t1.done(); + t2.step(function() { + assert_unreached("Unknown message"); + }); + t2.done(); + t3.step(function() { + assert_unreached("Unknown message"); + }); + t3.done(); + t4.step(function() { + assert_unreached("Unknown message"); + }); + t4.done(); + } + + if (messageCount == 2) { + // Got both messages from our popup; time to create our child. + var ifr = document.createElement("iframe"); + ifr.src = https_dir5 + "support/https-subframe-shared.html"; + document.body.appendChild(ifr); + } + } + + popup = window.open(http_dir + "support/shared-worker-insecure-popup.html?https_dir5"); + </script> + </body> +</html> |