forked from mirrors/gecko-dev
Automatic update from web-platform-tests Test isSecureContext for workers created from data URL in secure contexts Before fixing the bug in the next CL, I thought it would be nice to have a test. Even though this behavior is tested in [1], that test tests other complicated things and ignored in TestExpectations. [1] third_party/blink/web_tests/external/wpt/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/blob-data.https.html Bug: 1325494 Change-Id: I07c5e987bca3e75aa2282a1b04d021ee7d94c033 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/4381725 Commit-Queue: Titouan Rigoudy <titouan@chromium.org> Reviewed-by: Titouan Rigoudy <titouan@chromium.org> Cr-Commit-Position: refs/heads/main@{#1124097} -- wpt-commits: a59c1dce34c1309bae988cf5bd0c8faae49de870 wpt-pr: 39271
82 lines
2.6 KiB
HTML
82 lines
2.6 KiB
HTML
<!doctype html>
|
|
<html>
|
|
<head>
|
|
<meta charset=utf-8>
|
|
<title>Test SharedWorkerGlobalScope.isSecureContext for HTTP creator</title>
|
|
<meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object">
|
|
<script src=/resources/testharness.js></script>
|
|
<script src=/resources/testharnessreport.js></script>
|
|
<script src="server-locations.sub.js"></script>
|
|
</head>
|
|
<body>
|
|
<script>
|
|
var t1 = async_test("Shared worker");
|
|
var t2 = async_test("Nested worker in shared worker");
|
|
var t3 = async_test("Shared worker from https subframe");
|
|
var t4 = async_test("Nested worker from shared worker from https subframe");
|
|
var t5 = async_test("Shared worker from data URL");
|
|
|
|
t1.step(function() {
|
|
var w = new SharedWorker("support/shared-worker-script.js");
|
|
w.port.onmessage = t1.step_func_done(function(e) {
|
|
assert_true(e.data);
|
|
});
|
|
w.port.start();
|
|
});
|
|
|
|
t2.step(function() {
|
|
var w = new SharedWorker("support/parent-shared-worker-script.js");
|
|
w.port.onmessage = t2.step_func_done(function(e) {
|
|
assert_true(e.data);
|
|
});
|
|
w.port.start();
|
|
});
|
|
|
|
onmessage = function(e) {
|
|
var data = e.data;
|
|
if (data.type == "shared") {
|
|
t3.step(function() {
|
|
assert_false(data.exception);
|
|
assert_false(data.error);
|
|
assert_true(data.isSecureContext);
|
|
});
|
|
t3.done();
|
|
} else if (data.type == "nested") {
|
|
t4.step(function() {
|
|
assert_false(data.exception);
|
|
assert_false(data.error);
|
|
assert_true(data.isSecureContext);
|
|
});
|
|
t4.done();
|
|
} else {
|
|
t3.step(function() {
|
|
assert_unreached("Unknown message");
|
|
});
|
|
t3.done();
|
|
t4.step(function() {
|
|
assert_unreached("Unknown message");
|
|
});
|
|
t4.done();
|
|
}
|
|
}
|
|
|
|
var ifr = document.createElement("iframe");
|
|
ifr.src = https_dir3 + "support/https-subframe-shared.html";
|
|
document.body.appendChild(ifr);
|
|
|
|
t5.step(function() {
|
|
var w = new SharedWorker(
|
|
`data:text/javascript,addEventListener("connect", function (e) {
|
|
var port = e.ports[0];
|
|
port.start();
|
|
port.postMessage(isSecureContext);
|
|
});`
|
|
);
|
|
w.port.onmessage = t5.step_func_done(function(e) {
|
|
assert_true(e.data);
|
|
});
|
|
w.port.start();
|
|
});
|
|
</script>
|
|
</body>
|
|
</html>
|