summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/service-workers/service-worker/fetch-request-resources.https.html
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/tests/service-workers/service-worker/fetch-request-resources.https.html')
-rw-r--r--testing/web-platform/tests/service-workers/service-worker/fetch-request-resources.https.html189
1 files changed, 189 insertions, 0 deletions
diff --git a/testing/web-platform/tests/service-workers/service-worker/fetch-request-resources.https.html b/testing/web-platform/tests/service-workers/service-worker/fetch-request-resources.https.html
new file mode 100644
index 000000000..7a64e9444
--- /dev/null
+++ b/testing/web-platform/tests/service-workers/service-worker/fetch-request-resources.https.html
@@ -0,0 +1,189 @@
+<!DOCTYPE html>
+<title>Service Worker: FetchEvent for resources</title>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/get-host-info.sub.js"></script>
+<script src="resources/test-helpers.sub.js?pipe=sub"></script>
+<script>
+var url_count = 0;
+var expected_results = {};
+
+function image_test(frame, url, cross_origin, expected_mode,
+ expected_credentials) {
+ var actual_url = url + (++url_count);
+ expected_results[actual_url] = {
+ cross_origin: cross_origin,
+ mode: expected_mode,
+ credentials: expected_credentials,
+ integrity: '',
+ message: 'Image load (url:' +
+ actual_url + ' cross_origin:' + cross_origin + ')'
+ };
+ return frame.contentWindow.load_image(actual_url, cross_origin);
+}
+
+function script_test(frame, url, cross_origin, expected_mode,
+ expected_credentials) {
+ var actual_url = url + (++url_count);
+ expected_results[actual_url] = {
+ cross_origin: cross_origin,
+ mode: expected_mode,
+ credentials: expected_credentials,
+ integrity: '',
+ message: 'Script load (url:' +
+ actual_url + ' cross_origin:' + cross_origin + ')'
+ };
+ return frame.contentWindow.load_script(actual_url, cross_origin);
+}
+
+function css_test(frame, url, cross_origin, expected_mode,
+ expected_credentials) {
+ var actual_url = url + (++url_count);
+ expected_results[actual_url] = {
+ cross_origin: cross_origin,
+ mode: expected_mode,
+ credentials: expected_credentials,
+ integrity: '',
+ message: 'CSS load (url:' +
+ actual_url + ' cross_origin:' + cross_origin + ')'
+ };
+ return frame.contentWindow.load_css(actual_url, cross_origin);
+}
+
+function font_face_test(frame, url, expected_mode, expected_credentials) {
+ var actual_url = url + (++url_count);
+ expected_results[actual_url] = {
+ url: actual_url,
+ mode: expected_mode,
+ credentials: expected_credentials,
+ integrity: '',
+ message: 'FontFace load (url:' + actual_url + ')'
+ };
+ return frame.contentWindow.load_font(actual_url);
+}
+
+function script_integrity_test(frame, url, integrity, expected_integrity) {
+ var actual_url = url + (++url_count);
+ expected_results[actual_url] = {
+ url: actual_url,
+ mode: 'no-cors',
+ credentials: 'include',
+ integrity: expected_integrity,
+ message: 'Script load (url:' + actual_url + ')'
+ };
+ return frame.contentWindow.load_script_with_integrity(actual_url, integrity);
+}
+
+function css_integrity_test(frame, url, integrity, expected_integrity) {
+ var actual_url = url + (++url_count);
+ expected_results[actual_url] = {
+ url: actual_url,
+ mode: 'no-cors',
+ credentials: 'include',
+ integrity: expected_integrity,
+ message: 'CSS load (url:' + actual_url + ')'
+ };
+ return frame.contentWindow.load_css_with_integrity(actual_url, integrity);
+}
+
+async_test(function(t) {
+ var SCOPE = 'resources/fetch-request-resources-iframe.https.html';
+ var SCRIPT = 'resources/fetch-request-resources-worker.js';
+ var host_info = get_host_info();
+ var LOCAL_URL =
+ host_info['HTTPS_ORIGIN'] + base_path() + 'resources/dummy?test';
+ var REMOTE_URL =
+ host_info['HTTPS_REMOTE_ORIGIN'] + base_path() + 'resources/dummy?test';
+ var worker;
+ var frame;
+ service_worker_unregister_and_register(t, SCRIPT, SCOPE)
+ .then(function(registration) {
+ worker = registration.installing;
+ return wait_for_state(t, worker, 'activated');
+ })
+ .then(function() {
+ return new Promise(function(resolve) {
+ var channel = new MessageChannel();
+ channel.port1.onmessage = t.step_func(function(msg) {
+ if (msg.data.ready) {
+ resolve();
+ return;
+ }
+ var result = msg.data;
+ var expected = expected_results[result.url];
+ if (!expected) {
+ return;
+ }
+ assert_equals(
+ result.mode, expected.mode,
+ 'mode of ' + expected.message + ' must be ' +
+ expected.mode + '.');
+ assert_equals(
+ result.credentials, expected.credentials,
+ 'credentials of ' + expected.message + ' must be ' +
+ expected.credentials + '.');
+ assert_equals(
+ result.integrity, expected.integrity,
+ 'integrity of ' + expected.message + ' must be ' +
+ expected.integrity + '.');
+ --url_count;
+ delete expected_results[result.url];
+ if (url_count == 0) {
+ frame.remove();
+ service_worker_unregister_and_done(t, SCOPE);
+ }
+ });
+ worker.postMessage(
+ {port: channel.port2}, [channel.port2]);
+ });
+ })
+ .then(function() { return with_iframe(SCOPE); })
+ .then(function(f) {
+ frame = f;
+
+ image_test(f, LOCAL_URL, '', 'no-cors', 'include');
+ image_test(f, REMOTE_URL, '', 'no-cors', 'include');
+ css_test(f, LOCAL_URL, '', 'no-cors', 'include');
+ css_test(f, REMOTE_URL, '', 'no-cors', 'include');
+
+ image_test(f, LOCAL_URL, 'anonymous', 'cors', 'same-origin');
+ image_test(f, LOCAL_URL, 'use-credentials', 'cors', 'include');
+ image_test(f, REMOTE_URL, 'anonymous', 'cors', 'same-origin');
+ image_test(f, REMOTE_URL, 'use-credentials', 'cors', 'include');
+
+ script_test(f, LOCAL_URL, '', 'no-cors', 'include');
+ script_test(f, LOCAL_URL, 'anonymous', 'cors', 'same-origin');
+ script_test(f, LOCAL_URL, 'use-credentials', 'cors', 'include');
+ script_test(f, REMOTE_URL, '', 'no-cors', 'include');
+ script_test(f, REMOTE_URL, 'anonymous', 'cors', 'same-origin');
+ script_test(f, REMOTE_URL, 'use-credentials', 'cors', 'include');
+
+ css_test(f, LOCAL_URL, 'anonymous', 'cors', 'same-origin');
+ css_test(f, LOCAL_URL, 'use-credentials', 'cors', 'include');
+ css_test(f, REMOTE_URL, 'anonymous', 'cors', 'same-origin');
+ css_test(f, REMOTE_URL, 'use-credentials', 'cors', 'include');
+
+ font_face_test(f, LOCAL_URL, 'cors', 'same-origin');
+ font_face_test(f, REMOTE_URL, 'cors', 'same-origin');
+
+ script_integrity_test(f, LOCAL_URL, ' ', ' ');
+ script_integrity_test(f, LOCAL_URL,
+ 'This is not a valid integrity because it has no dashes',
+ 'This is not a valid integrity because it has no dashes');
+ script_integrity_test(f, LOCAL_URL, 'sha256-', 'sha256-');
+ script_integrity_test(f, LOCAL_URL, 'sha256-foo?123', 'sha256-foo?123');
+ script_integrity_test(f, LOCAL_URL, 'sha256-foo sha384-abc ', 'sha256-foo sha384-abc ');
+ script_integrity_test(f, LOCAL_URL, 'sha256-foo sha256-abc', 'sha256-foo sha256-abc');
+
+ css_integrity_test(f, LOCAL_URL, ' ', ' ');
+ css_integrity_test(f, LOCAL_URL,
+ 'This is not a valid integrity because it has no dashes',
+ 'This is not a valid integrity because it has no dashes');
+ css_integrity_test(f, LOCAL_URL, 'sha256-', 'sha256-');
+ css_integrity_test(f, LOCAL_URL, 'sha256-foo?123', 'sha256-foo?123');
+ css_integrity_test(f, LOCAL_URL, 'sha256-foo sha384-abc ', 'sha256-foo sha384-abc ');
+ css_integrity_test(f, LOCAL_URL, 'sha256-foo sha256-abc', 'sha256-foo sha256-abc');
+ })
+ .catch(unreached_rejection(t));
+ }, 'Verify FetchEvent for resources.');
+</script>