| Index: third_party/WebKit/LayoutTests/imported/wpt/service-workers/service-worker/fetch-request-resources.https.html
 | 
| diff --git a/third_party/WebKit/LayoutTests/imported/wpt/service-workers/service-worker/fetch-request-resources.https.html b/third_party/WebKit/LayoutTests/imported/wpt/service-workers/service-worker/fetch-request-resources.https.html
 | 
| new file mode 100644
 | 
| index 0000000000000000000000000000000000000000..7a64e9444dc961736e6034fdccfe34feb18ca3bb
 | 
| --- /dev/null
 | 
| +++ b/third_party/WebKit/LayoutTests/imported/wpt/service-workers/service-worker/fetch-request-resources.https.html
 | 
| @@ -0,0 +1,189 @@
 | 
| +<!DOCTYPE html>
 | 
| +<title>Service Worker: FetchEvent for resources</title>
 | 
| +<script src="/resources/testharness.js"></script>
 | 
| +<script src="/resources/testharnessreport.js"></script>
 | 
| +<script src="resources/get-host-info.sub.js"></script>
 | 
| +<script src="resources/test-helpers.sub.js?pipe=sub"></script>
 | 
| +<script>
 | 
| +var url_count = 0;
 | 
| +var expected_results = {};
 | 
| +
 | 
| +function image_test(frame, url, cross_origin, expected_mode,
 | 
| +                    expected_credentials) {
 | 
| +  var actual_url = url + (++url_count);
 | 
| +  expected_results[actual_url] = {
 | 
| +      cross_origin: cross_origin,
 | 
| +      mode: expected_mode,
 | 
| +      credentials: expected_credentials,
 | 
| +      integrity: '',
 | 
| +      message: 'Image load (url:' +
 | 
| +               actual_url + ' cross_origin:' + cross_origin + ')'
 | 
| +    };
 | 
| +  return frame.contentWindow.load_image(actual_url, cross_origin);
 | 
| +}
 | 
| +
 | 
| +function script_test(frame, url, cross_origin, expected_mode,
 | 
| +                     expected_credentials) {
 | 
| +  var actual_url = url + (++url_count);
 | 
| +  expected_results[actual_url] = {
 | 
| +      cross_origin: cross_origin,
 | 
| +      mode: expected_mode,
 | 
| +      credentials: expected_credentials,
 | 
| +      integrity: '',
 | 
| +      message: 'Script load (url:' +
 | 
| +               actual_url + ' cross_origin:' + cross_origin + ')'
 | 
| +    };
 | 
| +  return frame.contentWindow.load_script(actual_url, cross_origin);
 | 
| +}
 | 
| +
 | 
| +function css_test(frame, url, cross_origin, expected_mode,
 | 
| +                  expected_credentials) {
 | 
| +  var actual_url = url + (++url_count);
 | 
| +  expected_results[actual_url] = {
 | 
| +      cross_origin: cross_origin,
 | 
| +      mode: expected_mode,
 | 
| +      credentials: expected_credentials,
 | 
| +      integrity: '',
 | 
| +      message: 'CSS load (url:' +
 | 
| +               actual_url + ' cross_origin:' + cross_origin + ')'
 | 
| +    };
 | 
| +  return frame.contentWindow.load_css(actual_url, cross_origin);
 | 
| +}
 | 
| +
 | 
| +function font_face_test(frame, url, expected_mode, expected_credentials) {
 | 
| +  var actual_url = url + (++url_count);
 | 
| +  expected_results[actual_url] = {
 | 
| +      url: actual_url,
 | 
| +      mode: expected_mode,
 | 
| +      credentials: expected_credentials,
 | 
| +      integrity: '',
 | 
| +      message: 'FontFace load (url:' + actual_url + ')'
 | 
| +    };
 | 
| +  return frame.contentWindow.load_font(actual_url);
 | 
| +}
 | 
| +
 | 
| +function script_integrity_test(frame, url, integrity, expected_integrity) {
 | 
| +  var actual_url = url + (++url_count);
 | 
| +  expected_results[actual_url] = {
 | 
| +      url: actual_url,
 | 
| +      mode: 'no-cors',
 | 
| +      credentials: 'include',
 | 
| +      integrity: expected_integrity,
 | 
| +      message: 'Script load (url:' + actual_url + ')'
 | 
| +    };
 | 
| +  return frame.contentWindow.load_script_with_integrity(actual_url, integrity);
 | 
| +}
 | 
| +
 | 
| +function css_integrity_test(frame, url, integrity, expected_integrity) {
 | 
| +  var actual_url = url + (++url_count);
 | 
| +  expected_results[actual_url] = {
 | 
| +      url: actual_url,
 | 
| +      mode: 'no-cors',
 | 
| +      credentials: 'include',
 | 
| +      integrity: expected_integrity,
 | 
| +      message: 'CSS load (url:' + actual_url + ')'
 | 
| +    };
 | 
| +  return frame.contentWindow.load_css_with_integrity(actual_url, integrity);
 | 
| +}
 | 
| +
 | 
| +async_test(function(t) {
 | 
| +    var SCOPE = 'resources/fetch-request-resources-iframe.https.html';
 | 
| +    var SCRIPT = 'resources/fetch-request-resources-worker.js';
 | 
| +    var host_info = get_host_info();
 | 
| +    var LOCAL_URL =
 | 
| +      host_info['HTTPS_ORIGIN'] + base_path() + 'resources/dummy?test';
 | 
| +    var REMOTE_URL =
 | 
| +      host_info['HTTPS_REMOTE_ORIGIN'] + base_path() + 'resources/dummy?test';
 | 
| +    var worker;
 | 
| +    var frame;
 | 
| +    service_worker_unregister_and_register(t, SCRIPT, SCOPE)
 | 
| +      .then(function(registration) {
 | 
| +          worker = registration.installing;
 | 
| +          return wait_for_state(t, worker, 'activated');
 | 
| +        })
 | 
| +      .then(function() {
 | 
| +          return new Promise(function(resolve) {
 | 
| +              var channel = new MessageChannel();
 | 
| +              channel.port1.onmessage = t.step_func(function(msg) {
 | 
| +                if (msg.data.ready) {
 | 
| +                  resolve();
 | 
| +                  return;
 | 
| +                }
 | 
| +                var result = msg.data;
 | 
| +                var expected = expected_results[result.url];
 | 
| +                if (!expected) {
 | 
| +                  return;
 | 
| +                }
 | 
| +                assert_equals(
 | 
| +                    result.mode, expected.mode,
 | 
| +                    'mode of ' + expected.message +  ' must be ' +
 | 
| +                    expected.mode + '.');
 | 
| +                assert_equals(
 | 
| +                    result.credentials, expected.credentials,
 | 
| +                    'credentials of ' + expected.message +  ' must be ' +
 | 
| +                    expected.credentials + '.');
 | 
| +                assert_equals(
 | 
| +                    result.integrity, expected.integrity,
 | 
| +                    'integrity of ' + expected.message +  ' must be ' +
 | 
| +                    expected.integrity + '.');
 | 
| +                --url_count;
 | 
| +                delete expected_results[result.url];
 | 
| +                if (url_count == 0) {
 | 
| +                  frame.remove();
 | 
| +                  service_worker_unregister_and_done(t, SCOPE);
 | 
| +                }
 | 
| +              });
 | 
| +              worker.postMessage(
 | 
| +                {port: channel.port2}, [channel.port2]);
 | 
| +            });
 | 
| +        })
 | 
| +      .then(function() { return with_iframe(SCOPE); })
 | 
| +      .then(function(f) {
 | 
| +        frame = f;
 | 
| +
 | 
| +        image_test(f, LOCAL_URL, '', 'no-cors', 'include');
 | 
| +        image_test(f, REMOTE_URL, '', 'no-cors', 'include');
 | 
| +        css_test(f, LOCAL_URL, '', 'no-cors', 'include');
 | 
| +        css_test(f, REMOTE_URL, '', 'no-cors', 'include');
 | 
| +
 | 
| +        image_test(f, LOCAL_URL, 'anonymous', 'cors', 'same-origin');
 | 
| +        image_test(f, LOCAL_URL, 'use-credentials', 'cors', 'include');
 | 
| +        image_test(f, REMOTE_URL, 'anonymous', 'cors', 'same-origin');
 | 
| +        image_test(f, REMOTE_URL, 'use-credentials', 'cors', 'include');
 | 
| +
 | 
| +        script_test(f, LOCAL_URL, '', 'no-cors', 'include');
 | 
| +        script_test(f, LOCAL_URL, 'anonymous', 'cors', 'same-origin');
 | 
| +        script_test(f, LOCAL_URL, 'use-credentials', 'cors', 'include');
 | 
| +        script_test(f, REMOTE_URL, '', 'no-cors', 'include');
 | 
| +        script_test(f, REMOTE_URL, 'anonymous', 'cors', 'same-origin');
 | 
| +        script_test(f, REMOTE_URL, 'use-credentials', 'cors', 'include');
 | 
| +
 | 
| +        css_test(f, LOCAL_URL, 'anonymous', 'cors', 'same-origin');
 | 
| +        css_test(f, LOCAL_URL, 'use-credentials', 'cors', 'include');
 | 
| +        css_test(f, REMOTE_URL, 'anonymous', 'cors', 'same-origin');
 | 
| +        css_test(f, REMOTE_URL, 'use-credentials', 'cors', 'include');
 | 
| +
 | 
| +        font_face_test(f, LOCAL_URL, 'cors', 'same-origin');
 | 
| +        font_face_test(f, REMOTE_URL, 'cors', 'same-origin');
 | 
| +
 | 
| +        script_integrity_test(f, LOCAL_URL, '     ', '     ');
 | 
| +        script_integrity_test(f, LOCAL_URL,
 | 
| +                              'This is not a valid integrity because it has no dashes',
 | 
| +                              'This is not a valid integrity because it has no dashes');
 | 
| +        script_integrity_test(f, LOCAL_URL, 'sha256-', 'sha256-');
 | 
| +        script_integrity_test(f, LOCAL_URL, 'sha256-foo?123', 'sha256-foo?123');
 | 
| +        script_integrity_test(f, LOCAL_URL, 'sha256-foo sha384-abc ', 'sha256-foo sha384-abc ');
 | 
| +        script_integrity_test(f, LOCAL_URL, 'sha256-foo sha256-abc', 'sha256-foo sha256-abc');
 | 
| +
 | 
| +        css_integrity_test(f, LOCAL_URL, '     ', '     ');
 | 
| +        css_integrity_test(f, LOCAL_URL,
 | 
| +                           'This is not a valid integrity because it has no dashes',
 | 
| +                           'This is not a valid integrity because it has no dashes');
 | 
| +        css_integrity_test(f, LOCAL_URL, 'sha256-', 'sha256-');
 | 
| +        css_integrity_test(f, LOCAL_URL, 'sha256-foo?123', 'sha256-foo?123');
 | 
| +        css_integrity_test(f, LOCAL_URL, 'sha256-foo sha384-abc ', 'sha256-foo sha384-abc ');
 | 
| +        css_integrity_test(f, LOCAL_URL, 'sha256-foo sha256-abc', 'sha256-foo sha256-abc');
 | 
| +      })
 | 
| +      .catch(unreached_rejection(t));
 | 
| +  }, 'Verify FetchEvent for resources.');
 | 
| +</script>
 | 
| 
 |