From 6bf0a5cb5034a7e684dcc3500e841785237ce2dd Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 19:32:43 +0200 Subject: Adding upstream version 1:115.7.0. Signed-off-by: Daniel Baumann --- testing/web-platform/tests/direct-sockets/META.yml | 5 +++++ testing/web-platform/tests/direct-sockets/README.md | 2 ++ .../disabled-by-permissions-policy.https.sub.html | 14 ++++++++++++++ ...led-by-permissions-policy.https.sub.html.headers | 3 +++ .../disabled-by-permissions-policy.js | 8 ++++++++ .../direct-sockets/open-securecontext.http.html | 21 +++++++++++++++++++++ 6 files changed, 53 insertions(+) create mode 100644 testing/web-platform/tests/direct-sockets/META.yml create mode 100644 testing/web-platform/tests/direct-sockets/README.md create mode 100644 testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.https.sub.html create mode 100644 testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.https.sub.html.headers create mode 100644 testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.js create mode 100644 testing/web-platform/tests/direct-sockets/open-securecontext.http.html (limited to 'testing/web-platform/tests/direct-sockets') diff --git a/testing/web-platform/tests/direct-sockets/META.yml b/testing/web-platform/tests/direct-sockets/META.yml new file mode 100644 index 0000000000..85c05e8c83 --- /dev/null +++ b/testing/web-platform/tests/direct-sockets/META.yml @@ -0,0 +1,5 @@ +spec: https://github.com/WICG/direct-sockets/blob/main/docs/explainer.md +suggested_reviewers: + - ewilligers + - mgiuca + - phoglenix diff --git a/testing/web-platform/tests/direct-sockets/README.md b/testing/web-platform/tests/direct-sockets/README.md new file mode 100644 index 0000000000..71a19de690 --- /dev/null +++ b/testing/web-platform/tests/direct-sockets/README.md @@ -0,0 +1,2 @@ +These tests are for the TCP and UDP sockets API proposed in +https://github.com/WICG/direct-sockets/blob/main/docs/explainer.md diff --git a/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.https.sub.html b/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.https.sub.html new file mode 100644 index 0000000000..f2f6e50be0 --- /dev/null +++ b/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.https.sub.html @@ -0,0 +1,14 @@ + + + + + Sockets test: Can be disabled by permissions policy + + + + + + + + + diff --git a/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.https.sub.html.headers b/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.https.sub.html.headers new file mode 100644 index 0000000000..ba6f09f55b --- /dev/null +++ b/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.https.sub.html.headers @@ -0,0 +1,3 @@ +Cross-Origin-Opener-Policy: same-origin +Cross-Origin-Embedder-Policy: require-corp +Permissions-Policy: direct-sockets=() \ No newline at end of file diff --git a/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.js b/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.js new file mode 100644 index 0000000000..a27d1ddf49 --- /dev/null +++ b/testing/web-platform/tests/direct-sockets/disabled-by-permissions-policy.js @@ -0,0 +1,8 @@ +'use strict'; + +test(() => { + assert_throws_dom("NotAllowedError", () => new TCPSocket("address.com", 53), "constructor should throw"); +}, "tcp disabled by permissions-policy"); +test(() => { + assert_throws_dom("NotAllowedError", () => new UDPSocket({ remoteAddress: "address.com", remotePort: 53 }), "constructor should throw"); +}, "udp disabled by permissions-policy"); diff --git a/testing/web-platform/tests/direct-sockets/open-securecontext.http.html b/testing/web-platform/tests/direct-sockets/open-securecontext.http.html new file mode 100644 index 0000000000..c3a2a42a25 --- /dev/null +++ b/testing/web-platform/tests/direct-sockets/open-securecontext.http.html @@ -0,0 +1,21 @@ + + + + + Sockets test: Open from non-secure context + + + + + + + + -- cgit v1.2.3