diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:22:09 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:22:09 +0000 |
commit | 43a97878ce14b72f0981164f87f2e35e14151312 (patch) | |
tree | 620249daf56c0258faa40cbdcf9cfba06de2a846 /testing/web-platform/tests/secure-contexts/basic-dedicated-worker.https.html | |
parent | Initial commit. (diff) | |
download | firefox-upstream.tar.xz firefox-upstream.zip |
Adding upstream version 110.0.1.upstream/110.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/secure-contexts/basic-dedicated-worker.https.html')
-rw-r--r-- | testing/web-platform/tests/secure-contexts/basic-dedicated-worker.https.html | 95 |
1 files changed, 95 insertions, 0 deletions
diff --git a/testing/web-platform/tests/secure-contexts/basic-dedicated-worker.https.html b/testing/web-platform/tests/secure-contexts/basic-dedicated-worker.https.html new file mode 100644 index 0000000000..e794755cdf --- /dev/null +++ b/testing/web-platform/tests/secure-contexts/basic-dedicated-worker.https.html @@ -0,0 +1,95 @@ +<!doctype html> +<html> + <head> + <meta charset=utf-8> + <title>Test WorkerGlobalScope.isSecureContext for HTTPS creator</title> + <meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object"> + <script src=/resources/testharness.js></script> + <script src=/resources/testharnessreport.js></script> + <script src="server-locations.sub.js"></script> + </head> + <body> + <script> + var t1 = async_test("HTTP worker"); + var t2 = async_test("HTTPS worker"); + var t3 = async_test("HTTP nested worker"); + var t4 = async_test("HTTPS nested worker"); + var t5 = async_test("HTTP worker from HTTPS subframe"); + var t6 = async_test("HTTPS worker from HTTPS subframe"); + + try { + var w1 = new Worker(http_dir + "support/dedicated-worker-script.js"); + w1.onmessage = t1.step_func_done(function(e) { + assert_unreached("cross-origin workers should not be loaded"); + }); + w1.onerror = t1.step_func_done(function(e) { + e.preventDefault(); + }); + } catch (e) { + // Some browsers throw for cross-origin URLs. This violates the Worker spec, + // but isn't actually relevant to what we're testing here. + t1.done(); + } + + var w2 = new Worker(https_dir + "support/dedicated-worker-script.js"); + w2.onmessage = t2.step_func_done(function(e) { + assert_true(e.data); + }); + w2.onerror = t2.step_func_done(function(e) { + assert_unreached("isSecureContext should be supported"); + }); + + try { + var w3 = new Worker(http_dir + "support/parent-dedicated-worker-script.js"); + w3.onmessage = t3.step_func_done(function(e) { + assert_unreached("cross-origin workers should not be loaded"); + }); + w3.onerror = t3.step_func_done(function(e) { + e.preventDefault(); + }); + } catch (e) { + // Some browsers throw for cross-origin URLs. This violates the Worker spec, + // but isn't actually relevant to what we're testing here. + t3.done(); + } + + var w4 = new Worker(https_dir + "support/parent-dedicated-worker-script.js"); + w4.onmessage = t4.step_func_done(function(e) { + assert_true(e.data); + }); + w4.onerror = t4.step_func_done(function(e) { + assert_unreached("isSecureContext should be supported"); + }); + + onmessage = function(e) { + var data = e.data; + if (data.type == "http") { + t5.step(function() { + assert_true(data.error); + }); + t5.done(); + } else if (data.type == "https") { + t6.step(function() { + assert_false(data.error); + assert_true(data.isSecureContext); + }); + t6.done(); + } else { + t5.step(function() { + assert_unreached("Unknown message"); + }); + t5.done(); + t6.step(function() { + assert_unreached("Unknown message"); + }); + t6.done(); + } + } + + var ifr = document.createElement("iframe"); + ifr.src = https_dir + "support/https-subframe-dedicated.html"; + document.body.appendChild(ifr); + </script> + </body> +</html> + |