diff options
Diffstat (limited to 'testing/web-platform/tests/serial/serial-disabled-by-permissions-policy.https.sub.html')
-rw-r--r-- | testing/web-platform/tests/serial/serial-disabled-by-permissions-policy.https.sub.html | 74 |
1 files changed, 74 insertions, 0 deletions
diff --git a/testing/web-platform/tests/serial/serial-disabled-by-permissions-policy.https.sub.html b/testing/web-platform/tests/serial/serial-disabled-by-permissions-policy.https.sub.html new file mode 100644 index 0000000000..251bf84f47 --- /dev/null +++ b/testing/web-platform/tests/serial/serial-disabled-by-permissions-policy.https.sub.html @@ -0,0 +1,74 @@ +<!DOCTYPE html> +<body> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/resources/test-only-api.js"></script> +<script src="/serial/resources/automation.js"></script> +<script src="/permissions-policy/resources/permissions-policy.js"></script> +<script> +'use strict'; +const sub = 'https://{{domains[www]}}:{{ports[https][0]}}'; +const same_origin_src = '/permissions-policy/resources/permissions-policy-serial.html'; +const cross_origin_src = sub + same_origin_src; +const same_origin_worker_frame_src = + '/permissions-policy/resources/permissions-policy-serial-worker.html'; +const cross_origin_worker_frame_src = sub + same_origin_worker_frame_src; +const header = 'Permissions-Policy header serial=()'; + +async function sleep(timeout) { + return new Promise(resolve => { + step_timeout(() => { + resolve(); + }, timeout); + }); +} + +promise_test(() => { + return navigator.serial.getPorts().then(() => { + assert_unreached('expected promise to reject with SecurityError'); + }, error => { + assert_equals(error.name, 'SecurityError'); + }); +}, header + ' disallows getPorts in the top-level document.'); + +async_test(t => { + test_feature_availability('serial.getPorts()', t, same_origin_src, + expect_feature_unavailable_default); +}, header + ' disallows same-origin iframes.'); + +async_test(t => { + test_feature_availability('serial.getPorts()', t, same_origin_worker_frame_src, + expect_feature_unavailable_default); +}, header + ' disallows workers in same-origin iframes.'); + +async_test(t => { + test_feature_availability('serial.getPorts()', t, cross_origin_src, + expect_feature_unavailable_default); +}, header + ' disallows cross-origin iframes.'); + +async_test(t => { + test_feature_availability('serial.getPorts()', t, + cross_origin_worker_frame_src, + expect_feature_unavailable_default); +}, header + ' disallows workers in cross-origin iframes.'); + +fetch_tests_from_worker(new Worker( + 'resources/serial-disabled-by-permissions-policy-worker.js')); + +serial_test(async (t, fake) => { + let eventWatcher = new EventWatcher(t, navigator.serial, 'connect'); + + // This isn't necessary as the expected scenario shouldn't send any mojo + // request. However, in order to capture a bug that doesn't reject adding + // event listener, time delay here is to allow mojo request to be intercepted + // after adding connect event listener. + await sleep(100); + + // If device connect event fires, EventWatcher will assert for an unexpected + // event. + fake.addPort(); + // Time delay here is to allow event to be fired if any. + await sleep(100); +}, 'Connect event is not fired when serial is disallowed.'); +</script> +</body> |