summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/cookies/secure/set-from-ws.https.sub.html
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /testing/web-platform/tests/cookies/secure/set-from-ws.https.sub.html
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'testing/web-platform/tests/cookies/secure/set-from-ws.https.sub.html')
-rw-r--r--testing/web-platform/tests/cookies/secure/set-from-ws.https.sub.html45
1 files changed, 45 insertions, 0 deletions
diff --git a/testing/web-platform/tests/cookies/secure/set-from-ws.https.sub.html b/testing/web-platform/tests/cookies/secure/set-from-ws.https.sub.html
new file mode 100644
index 000000000..b12504450
--- /dev/null
+++ b/testing/web-platform/tests/cookies/secure/set-from-ws.https.sub.html
@@ -0,0 +1,45 @@
+<!doctype html>
+<html>
+<head>
+ <meta charset=utf-8>
+ <title>Set 'secure' cookie from `Set-Cookie` HTTP header on a non-secure WebSocket</title>
+ <meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/cookies/resources/testharness-helpers.js"></script>
+</head>
+<body>
+<div id=log></div>
+<script>
+ function clearKnownCookie() {
+ document.cookie = "ws_test_secure_from_nonsecure=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
+ }
+
+ async_test(function (t) {
+ t.add_cleanup(clearKnownCookie);
+ assert_equals(document.cookie.match(/ws_test_secure_from_nonsecure=/), null);
+
+ clearKnownCookie();
+ var ws = new WebSocket("ws://{{host}}:{{ports[ws][0]}}/set-cookie-secure?secure_from_nonsecure");
+ ws.onclose = t.step_func_done(function () {
+ assert_unreached("'close' should not fire before 'open'.");
+ });
+ ws.onopen = t.step_func(function (e) {
+ ws.onclose = null;
+ ws.close();
+ assert_false(/ws_test_secure_from_nonsecure=test/.test(document.cookie));
+
+ var ws2 = new WebSocket("wss://{{host}}:{{ports[wss][0]}}/echo-cookie");
+ ws2.onclose = t.step_func_done(function () {
+ assert_unreached("'close' should not fire before 'open'.");
+ });
+ ws2.onmessage = t.step_func_done(function (e) {
+ ws2.onclose = null;
+ ws2.close();
+ assert_false(/ws_test_secure_from_nonsecure=test/.test(e.data));
+ });
+ });
+ }, "'secure' cookie not sent in WSS request when set from WS");
+</script>
+</body>
+</html>