Index: LayoutTests/http/tests/serviceworker/chromium/sandboxed-iframe-fetch-event.html |
diff --git a/LayoutTests/http/tests/serviceworker/chromium/sandboxed-iframe-fetch-event.html b/LayoutTests/http/tests/serviceworker/chromium/sandboxed-iframe-fetch-event.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..653d4a71712db6237b56059cd9e8009f04f1bfc5 |
--- /dev/null |
+++ b/LayoutTests/http/tests/serviceworker/chromium/sandboxed-iframe-fetch-event.html |
@@ -0,0 +1,203 @@ |
+<!DOCTYPE html> |
+<title>ServiceWorker FetchEvent for sandboxed iframe.</title> |
+<script src="../../resources/testharness.js"></script> |
+<script src="../../resources/testharnessreport.js"></script> |
+<script src="../resources/test-helpers.js"></script> |
+<body> |
+<script> |
+var lastCallbackId = 0; |
+var callbacks = {}; |
+function postMassageAndWaitResult(frame) { |
+ return new Promise(function(resolve) { |
+ var id = ++lastCallbackId; |
+ callbacks[id] = resolve; |
+ frame.contentWindow.postMessage({id:id}, '*'); |
+ }); |
+} |
+ |
+window.onmessage = function (e) { |
+ message = e.data; |
+ var id = message['id']; |
+ var calback = callbacks[id]; |
+ delete callbacks[id]; |
+ calback(message['result']); |
+}; |
+ |
+promise_test(function(t) { |
+ var SCOPE = 'resources/sandboxed-iframe-fetch-event-iframe.html'; |
+ var SCRIPT = 'resources/sandboxed-iframe-fetch-event-worker.js'; |
+ var frames = []; |
+ var worker; |
+ return service_worker_unregister_and_register(t, SCRIPT, SCOPE) |
+ .then(function(registration) { |
+ worker = registration.installing; |
+ return wait_for_state(t, registration.installing, 'activated'); |
+ }) |
+ .then(function() { |
+ return with_iframe(SCOPE + '?iframe'); |
+ }) |
+ .then(function(frame) { |
+ frames.push(frame); |
+ return postMassageAndWaitResult(frame); |
+ }) |
+ .then(function(result) { |
+ assert_equals(result, 'done'); |
+ return with_sandboxed_iframe(SCOPE + '?script', 'allow-scripts'); |
+ }) |
+ .then(function(frame) { |
+ frames.push(frame); |
+ return postMassageAndWaitResult(frame); |
+ }) |
+ .then(function(result) { |
+ assert_equals(result, 'done'); |
+ return with_sandboxed_iframe(SCOPE + '?script-origin', |
+ 'allow-scripts allow-same-origin'); |
+ }) |
+ .then(function(frame) { |
+ frames.push(frame); |
+ return postMassageAndWaitResult(frame); |
+ }) |
+ .then(function(result) { |
+ assert_equals(result, 'done'); |
+ return new Promise(function(resolve) { |
+ var channel = new MessageChannel(); |
+ channel.port1.onmessage = function(msg) { |
+ resolve(msg); |
+ }; |
+ worker.postMessage({port: channel.port2}, [channel.port2]); |
+ }); |
+ }) |
+ .then(function(msg) { |
+ for (var frame of frames) { |
+ frame.remove(); |
+ } |
+ var expected_base_url = new URL(SCOPE, location.href).href; |
+ var request_set = {}; |
+ for (var request of msg.data.requests) { |
+ request_set[request] = true; |
+ } |
+ assert_true( |
+ expected_base_url + '?iframe' in request_set, |
+ 'The request for normal iframe should be handled by SW.'); |
+ assert_true( |
+ expected_base_url + '?iframe_fetch' in request_set, |
+ 'The fetch request from normal iframe should be handled by SW.'); |
+ assert_true( |
+ expected_base_url + '?iframe_iframe' in request_set, |
+ 'The request for normal iframe inside normal iframe should be ' + |
+ 'handled by SW.'); |
+ assert_false( |
+ expected_base_url + '?iframe_script' in request_set, |
+ 'The request for sandboxed iframe with allow-scripts flag ' + |
+ 'inside normal iframe should not be handled by SW.'); |
+ assert_true( |
+ expected_base_url + '?iframe_script-origin' in request_set, |
+ 'The request for sandboxed iframe with allow-scripts and ' + |
+ 'allow-same-origin flag inside normal iframe should be handled ' + |
+ 'by SW.'); |
+ assert_false( |
+ expected_base_url + '?script' in request_set, |
+ 'The request for sandboxed iframe with allow-scripts flag ' + |
+ 'should not be handled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script_fetch' in request_set, |
+ 'The fetch request from sandboxed iframe with allow-scripts ' + |
+ 'flag should not be handled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script_iframe' in request_set, |
+ 'The request for normal iframe inside sandboxed iframe with ' + |
+ 'allow-scripts flag should not be handled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script_script' in request_set, |
+ 'The request for sandboxed iframe with allow-scripts flag ' + |
+ 'inside sandboxed iframe with allow-scripts flag should not be ' + |
+ 'handled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script_script-origin' in request_set, |
+ 'The request for sandboxed iframe with allow-scripts and ' + |
+ 'allow-same-origin flag inside sandboxed iframe with ' + |
+ 'allow-scripts flag should not be handled by SW.'); |
+ assert_true( |
+ expected_base_url + '?script-origin' in request_set, |
+ 'The request for sandboxed iframe with allow-scripts and ' + |
+ 'allow-same-origin flag should be handled by SW.'); |
+ assert_true( |
+ expected_base_url + '?script-origin_fetch' in request_set, |
+ 'The fetch request from sandboxed iframe with allow-scripts ' + |
+ 'and allow-same-origin flag should be handled by SW.'); |
+ assert_true( |
+ expected_base_url + '?script-origin_iframe' in request_set, |
+ 'The request for normal iframe inside sandboxed iframe with ' + |
+ 'allow-scripts and allow-same-origin flag should be handled by' + |
+ 'SW.'); |
+ assert_false( |
+ expected_base_url + '?script-origin_script' in request_set, |
+ 'The request for sandboxed iframe with allow-scripts flag ' + |
+ 'inside sandboxed iframe with allow-scripts and ' + |
+ 'allow-same-origin flag should be handled by SW.'); |
+ assert_true( |
+ expected_base_url + '?script-origin_script-origin' in request_set, |
+ 'The request for sandboxed iframe with allow-scripts and' + |
+ 'allow-same-origin flag inside sandboxed iframe with ' + |
+ 'allow-scripts and allow-same-origin flag should be handled by' + |
+ 'SW.'); |
+ |
+ var client_set = {}; |
+ for (var client of msg.data.clients) { |
+ client_set[client] = true; |
+ } |
+ assert_true( |
+ expected_base_url + '?iframe' in client_set, |
+ 'The normal iframe should be controlled by SW.'); |
+ assert_true( |
+ expected_base_url + '?iframe_iframe' in client_set, |
+ 'The normal iframe inside normal iframe should be controlled ' + |
+ 'by SW.'); |
+ assert_false( |
+ expected_base_url + '?iframe_script' in client_set, |
+ 'The sandboxed iframe with allow-scripts flag inside normal ' + |
+ 'iframe should not be controlled by SW.'); |
+ assert_true( |
+ expected_base_url + '?iframe_script-origin' in client_set, |
+ 'The sandboxed iframe with allow-scripts and allow-same-origin' + |
+ 'flag inside normal iframe should be controlled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script' in client_set, |
+ 'The sandboxed iframe with allow-scripts flag should not be ' + |
+ 'controlled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script_iframe' in client_set, |
+ 'The normal iframe inside sandboxed iframe with allow-scripts' + |
+ 'flag should not be controlled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script_script' in client_set, |
+ 'The sandboxed iframe with allow-scripts flag inside sandboxed ' + |
+ 'iframe with allow-scripts flag should not be controlled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script_script-origin' in client_set, |
+ 'The sandboxed iframe with allow-scripts and allow-same-origin ' + |
+ 'flag inside sandboxed iframe with allow-scripts flag should ' + |
+ 'not be controlled by SW.'); |
+ assert_true( |
+ expected_base_url + '?script-origin' in client_set, |
+ 'The sandboxed iframe with allow-scripts and allow-same-origin ' + |
+ 'flag should be controlled by SW.'); |
+ assert_true( |
+ expected_base_url + '?script-origin_iframe' in client_set, |
+ 'The normal iframe inside sandboxed iframe with allow-scripts ' + |
+ 'and allow-same-origin flag should be controlled by SW.'); |
+ assert_false( |
+ expected_base_url + '?script-origin_script' in client_set, |
+ 'The sandboxed iframe with allow-scripts flag inside sandboxed ' + |
+ 'iframe with allow-scripts and allow-same-origin flag should ' + |
+ 'be controlled by SW.'); |
+ assert_true( |
+ expected_base_url + '?script-origin_script-origin' in client_set, |
+ 'The sandboxed iframe with allow-scripts and allow-same-origin ' + |
+ 'flag inside sandboxed iframe with allow-scripts and ' + |
+ 'allow-same-origin flag should be controlled by SW.'); |
+ return service_worker_unregister_and_done(t, SCOPE); |
+ }); |
+ }, 'ServiceWorker FetchEvent for sandboxed iframe.'); |
+</script> |
+</body> |