Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(102)

Side by Side Diff: third_party/WebKit/LayoutTests/http/tests/security/secureContexts/authenticated_srcdoc.html

Issue 1723753002: Make Document::isSecureContext() work for OOPIFs (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: more rebase fixups Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <title>Authenticated origins are secure, both at top-level and in frames.</t itle> 4 <title>Authenticated origin with srcdoc iframe is secure</title>
5 <script src="/resources/testharness.js"></script> 5 <script src="/resources/testharness.js"></script>
6 <script src="/resources/testharness-helpers.js"></script>
6 <script src="/resources/testharnessreport.js"></script> 7 <script src="/resources/testharnessreport.js"></script>
7 <script src="/resources/get-host-info.js"></script> 8 <script src="/resources/get-host-info.js"></script>
8 </head> 9 </head>
9 <body> 10 <body>
10 <script> 11 <script>
11 if (window.testRunner)
12 testRunner.overridePreference("WebKitAllowRunningInsecureContent", t rue);
13
14 if (window.location.origin != get_host_info().AUTHENTICATED_ORIGIN) { 12 if (window.location.origin != get_host_info().AUTHENTICATED_ORIGIN) {
15 window.location = get_host_info().AUTHENTICATED_ORIGIN + 13 window.location = get_host_info().AUTHENTICATED_ORIGIN +
16 window.location.pathname; 14 window.location.pathname;
17 } else { 15 } else {
18 test(function () { 16 test(function () {
19 assert_equals(window.location.origin, get_host_info().AUTHENTICA TED_ORIGIN, "Sanity check the test runner."); 17 assert_equals(window.location.origin, get_host_info().AUTHENTICA TED_ORIGIN, "Sanity check the test runner.");
20 assert_true(window.isSecureContext); 18 assert_true(window.isSecureContext);
21 }, "authenticated origin is secure at the top-level."); 19 }, "authenticated origin is secure.");
22 20
23 async_test(function (t) { 21 async_test(function (t) {
24 var messages = 0; 22 var messages = 0;
25 window.addEventListener("message", t.step_func(function (e) { 23 window.addEventListener("message", t.step_func(function (e) {
26 if (e.origin == get_host_info().AUTHENTICATED_ORIGIN) 24 assert_true(e.data.isSecureContext);
27 assert_true(e.data.isSecureContext);
28 if (e.origin == get_host_info().UNAUTHENTICATED_ORIGIN)
29 assert_false(e.data.isSecureContext);
30 messages++; 25 messages++;
31 if (messages >= 2) 26 if (messages >= 1)
32 t.done(); 27 t.done();
33 }), false); 28 }), false);
34 29
35 var i1 = document.createElement("iframe"); 30 var i1 = document.createElement("iframe");
36 i1.src = get_host_info().UNAUTHENTICATED_ORIGIN + "/security/sec ureContexts/resources/post-securecontext-status.html"; 31 i1.srcdoc = "<iframe src='" + get_host_info().HTTPS_REMOTE_ORIGI N + "/security/secureContexts/resources/post-securecontext-status.html" + "'></i frame>";
37 document.body.appendChild(i1); 32 document.body.appendChild(i1);
38 33 }, "Frames inside sandboxed frames are secure");
39 var i2 = document.createElement("iframe");
40 i2.src = get_host_info().AUTHENTICATED_ORIGIN + "/security/secur eContexts/resources/post-securecontext-status.html";
41 document.body.appendChild(i2);
42 }, "Frames are either secure or insecure.");
43 } 34 }
44 </script> 35 </script>
45 </body> 36 </body>
46 </html> 37 </html>
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698