summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/fetch/nosniff/image.html
blob: 9dfdb94cf62a4cde91e44f6d4299ca26c15ba9db (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
<script src=/resources/testharness.js></script>
<script src=/resources/testharnessreport.js></script>
<div id=log></div>
<script>
  // Note: images get always sniffed, nosniff doesn't do anything
  // (but note the tentative Cross-Origin Read Blocking (CORB) tests
  // - for example wpt/fetch/corb/img-mime-types-coverage.tentative.sub.html).
  var passes = [
      // Empty or non-sensical MIME types
      null, "", "x", "x/x",

      // Image MIME types
      "image/gif", "image/png", "image/png;blah", "image/svg+xml",

      // CORB-protected MIME types (but note that CORB doesn't apply here,
      // because CORB ignores same-origin requests).
      "text/html", "application/xml", "application/blah+xml"
  ]

  const get_url = (mime) => {
    let url = "resources/image.py"
    if (mime != null) {
        url += "?type=" + encodeURIComponent(mime)
    }
    return url
  }

  passes.forEach(function(mime) {
    async_test(function(t) {
      var img = document.createElement("img")
      img.onerror = t.unreached_func("Unexpected error event")
      img.onload = t.step_func_done(function(){
        assert_equals(img.width, 96)
      })
      img.src = get_url(mime)
      document.body.appendChild(img)
    }, "URL query: " + mime)
  })
</script>