Chromium Code Reviews| Index: LayoutTests/http/tests/serviceworker/chromium/sandboxed-iframe-fetch-event.html |
| diff --git a/LayoutTests/http/tests/serviceworker/chromium/sandboxed-iframe-fetch-event.html b/LayoutTests/http/tests/serviceworker/chromium/sandboxed-iframe-fetch-event.html |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..a3d0bcbb82c0dcb223b7cd2d0781de4453d3f0d2 |
| --- /dev/null |
| +++ b/LayoutTests/http/tests/serviceworker/chromium/sandboxed-iframe-fetch-event.html |
| @@ -0,0 +1,203 @@ |
| +<!DOCTYPE html> |
| +<title>ServiceWorker FetchEvent for sandboxed iframe.</title> |
| +<script src="../../resources/testharness.js"></script> |
| +<script src="../../resources/testharnessreport.js"></script> |
| +<script src="../resources/test-helpers.js"></script> |
| +<body> |
| +<script> |
| +var lastCallbackId = 0; |
| +var callbacks = {}; |
| +function postMassageAndWaitResult(frame) { |
| + return new Promise(function(resolve) { |
| + var id = ++lastCallbackId; |
| + callbacks[id] = resolve; |
| + frame.contentWindow.postMessage({id:id}, '*'); |
| + }); |
| +} |
| + |
| +window.onmessage = function (e) { |
| + message = e.data; |
| + var id = message['id']; |
| + var calback = callbacks[id]; |
| + delete callbacks[id]; |
| + calback(message['result']); |
| +}; |
| + |
| +promise_test(function(t) { |
| + var SCOPE = 'resources/sandboxed-iframe-fetch-event-iframe.html'; |
| + var SCRIPT = 'resources/sandboxed-iframe-fetch-event-worker.js'; |
| + var frames = []; |
| + var worker; |
| + return service_worker_unregister_and_register(t, SCRIPT, SCOPE) |
| + .then(function(registration) { |
| + worker = registration.installing; |
| + return wait_for_state(t, registration.installing, 'activated'); |
| + }) |
| + .then(function() { |
| + return with_iframe(SCOPE + '?iframe'); |
| + }) |
| + .then(function(frame) { |
| + frames.push(frame); |
| + return postMassageAndWaitResult(frame); |
| + }) |
| + .then(function(result) { |
| + assert_equals(result, 'done'); |
| + return with_sandboxed_iframe(SCOPE + '?script', 'allow-scripts'); |
| + }) |
| + .then(function(frame) { |
| + frames.push(frame); |
| + return postMassageAndWaitResult(frame); |
| + }) |
| + .then(function(result) { |
| + assert_equals(result, 'done'); |
| + return with_sandboxed_iframe(SCOPE + '?script-origin', |
| + 'allow-scripts allow-same-origin'); |
| + }) |
| + .then(function(frame) { |
| + frames.push(frame); |
| + return postMassageAndWaitResult(frame); |
| + }) |
| + .then(function(result) { |
| + assert_equals(result, 'done'); |
| + return new Promise(function(resolve) { |
| + var channel = new MessageChannel(); |
| + channel.port1.onmessage = function(msg) { |
| + resolve(msg); |
| + }; |
| + worker.postMessage({port: channel.port2}, [channel.port2]); |
| + }); |
| + }) |
| + .then(function(msg) { |
| + for (var frame of frames) { |
| + frame.remove(); |
| + } |
| + var expected_base_url = new URL(SCOPE, location.href).href; |
| + var request_set = {}; |
| + for (var request of msg.data.requests) { |
| + request_set[request] = true; |
| + } |
| + assert_true( |
| + !!request_set[expected_base_url + '?iframe'], |
|
nhiroki
2015/06/26 04:33:32
You might want to use 'in' operator like this:
horo
2015/06/26 04:57:25
Done.
|
| + 'The request for normal iframe should be handled by SW.'); |
| + assert_true( |
| + !!request_set[expected_base_url + '?iframe_fetch'], |
| + 'The fetch request from normal iframe should be handled by SW.'); |
| + assert_true( |
| + !!request_set[expected_base_url + '?iframe_iframe'], |
| + 'The request for normal iframe inside normal iframe should be ' + |
| + 'handled by SW.'); |
| + assert_false( |
| + !!request_set[expected_base_url + '?iframe_script'], |
| + 'The request for sandboxed iframe with allow-scripts flag ' + |
| + 'inside normal iframe should not be handled by SW.'); |
| + assert_true( |
| + !!request_set[expected_base_url + '?iframe_script-origin'], |
| + 'The request for sandboxed iframe with allow-scripts and ' + |
| + 'allow-same-origin flag inside normal iframe should be handled ' + |
| + 'by SW.'); |
| + assert_false( |
| + !!request_set[expected_base_url + '?script'], |
| + 'The request for sandboxed iframe with allow-scripts flag ' + |
| + 'should not be handled by SW.'); |
| + assert_false( |
| + !!request_set[expected_base_url + '?script_fetch'], |
| + 'The fetch request from sandboxed iframe with allow-scripts ' + |
| + 'flag should not be handled by SW.'); |
| + assert_false( |
| + !!request_set[expected_base_url + '?script_iframe'], |
| + 'The request for normal iframe inside sandboxed iframe with ' + |
| + 'allow-scripts flag should not be handled by SW.'); |
| + assert_false( |
| + !!request_set[expected_base_url + '?script_script'], |
| + 'The request for sandboxed iframe with allow-scripts flag ' + |
| + 'inside sandboxed iframe with allow-scripts flag should not be ' + |
| + 'handled by SW.'); |
| + assert_false( |
| + !!request_set[expected_base_url + '?script_script-origin'], |
| + 'The request for sandboxed iframe with allow-scripts and ' + |
| + 'allow-same-origin flag inside sandboxed iframe with ' + |
| + 'allow-scripts flag should not be handled by SW.'); |
| + assert_true( |
| + !!request_set[expected_base_url + '?script-origin'], |
| + 'The request for sandboxed iframe with allow-scripts and ' + |
| + 'allow-same-origin flag should be handled by SW.'); |
| + assert_true( |
| + !!request_set[expected_base_url + '?script-origin_fetch'], |
| + 'The fetch request from sandboxed iframe with allow-scripts ' + |
| + 'and allow-same-origin flag should be handled by SW.'); |
| + assert_true( |
| + !!request_set[expected_base_url + '?script-origin_iframe'], |
| + 'The request for normal iframe inside sandboxed iframe with ' + |
| + 'allow-scripts and allow-same-origin flag should be handled by' + |
| + 'SW.'); |
| + assert_false( |
| + !!request_set[expected_base_url + '?script-origin_script'], |
| + 'The request for sandboxed iframe with allow-scripts flag ' + |
| + 'inside sandboxed iframe with allow-scripts and ' + |
| + 'allow-same-origin flag should be handled by SW.'); |
| + assert_true( |
| + !!request_set[expected_base_url + '?script-origin_script-origin'], |
| + 'The request for sandboxed iframe with allow-scripts and' + |
| + 'allow-same-origin flag inside sandboxed iframe with ' + |
| + 'allow-scripts and allow-same-origin flag should be handled by' + |
| + 'SW.'); |
| + |
| + var client_set = {}; |
| + for (var client of msg.data.clients) { |
| + client_set[client] = true; |
| + } |
| + assert_true( |
| + !!client_set[expected_base_url + '?iframe'], |
| + 'The normal iframe should be controlled by SW.'); |
| + assert_true( |
| + !!client_set[expected_base_url + '?iframe_iframe'], |
| + 'The normal iframe inside normal iframe should be controlled ' + |
| + 'by SW.'); |
| + assert_false( |
| + !!client_set[expected_base_url + '?iframe_script'], |
| + 'The sandboxed iframe with allow-scripts flag inside normal ' + |
| + 'iframe should not be controlled by SW.'); |
| + assert_true( |
| + !!client_set[expected_base_url + '?iframe_script-origin'], |
| + 'The sandboxed iframe with allow-scripts and allow-same-origin' + |
| + 'flag inside normal iframe should be controlled by SW.'); |
| + assert_false( |
| + !!client_set[expected_base_url + '?script'], |
| + 'The sandboxed iframe with allow-scripts flag should not be ' + |
| + 'controlled by SW.'); |
| + assert_false( |
| + !!client_set[expected_base_url + '?script_iframe'], |
| + 'The normal iframe inside sandboxed iframe with allow-scripts' + |
| + 'flag should not be controlled by SW.'); |
| + assert_false( |
| + !!client_set[expected_base_url + '?script_script'], |
| + 'The sandboxed iframe with allow-scripts flag inside sandboxed ' + |
| + 'iframe with allow-scripts flag should not be controlled by SW.'); |
| + assert_false( |
| + !!client_set[expected_base_url + '?script_script-origin'], |
| + 'The sandboxed iframe with allow-scripts and allow-same-origin ' + |
| + 'flag inside sandboxed iframe with allow-scripts flag should ' + |
| + 'not be controlled by SW.'); |
| + assert_true( |
| + !!client_set[expected_base_url + '?script-origin'], |
| + 'The sandboxed iframe with allow-scripts and allow-same-origin ' + |
| + 'flag should be controlled by SW.'); |
| + assert_true( |
| + !!client_set[expected_base_url + '?script-origin_iframe'], |
| + 'The normal iframe inside sandboxed iframe with allow-scripts ' + |
| + 'and allow-same-origin flag should be controlled by SW.'); |
| + assert_false( |
| + !!client_set[expected_base_url + '?script-origin_script'], |
| + 'The sandboxed iframe with allow-scripts flag inside sandboxed ' + |
| + 'iframe with allow-scripts and allow-same-origin flag should ' + |
| + 'be controlled by SW.'); |
| + assert_true( |
| + !!client_set[expected_base_url + '?script-origin_script-origin'], |
| + 'The sandboxed iframe with allow-scripts and allow-same-origin ' + |
| + 'flag inside sandboxed iframe with allow-scripts and ' + |
| + 'allow-same-origin flag should be controlled by SW.'); |
| + return service_worker_unregister_and_done(t, SCOPE); |
| + }); |
| + }, 'ServiceWorker FetchEvent for sandboxed iframe.'); |
| +</script> |
| +</body> |