https://github.com/web-platform-tests/wpt
Raw File
Tip revision: beb53fc12894d91cb6ff2380ea0e87608044e64e authored by Philip Jägenstedt on 20 December 2018, 16:25:34 UTC
Remove "Uninstall Python packages" step
Tip revision: beb53fc
basic-dedicated-worker.https.html
<!doctype html>
<html>
  <head>
    <meta charset=utf-8>
    <title>Test WorkerGlobalScope.isSecureContext for HTTPS creator</title>
    <meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object">
    <script src=/resources/testharness.js></script>
    <script src=/resources/testharnessreport.js></script>
    <script src="server-locations.sub.js"></script>
  </head>
  <body>
    <script>
      var t1 = async_test("HTTP worker");
      var t2 = async_test("HTTPS worker");
      var t3 = async_test("HTTP nested worker");
      var t4 = async_test("HTTPS nested worker");
      var t5 = async_test("HTTP worker from HTTPS subframe");
      var t6 = async_test("HTTPS worker from HTTPS subframe");

      try {
        var w1 = new Worker(http_dir + "support/dedicated-worker-script.js");
        w1.onmessage = t1.step_func_done(function(e) {
          assert_unreached("cross-origin workers should not be loaded");
        });
        w1.onerror = t1.step_func_done(function(e) {
          e.preventDefault();
        });
      } catch (e) {
        // Some browsers throw for cross-origin URLs. This violates the Worker spec,
        // but isn't actually relevant to what we're testing here.
        t1.done();
      }

      var w2 = new Worker(https_dir + "support/dedicated-worker-script.js");
      w2.onmessage = t2.step_func_done(function(e) {
        assert_true(e.data);
      });
      w2.onerror = t2.step_func_done(function(e) {
        assert_unreached("isSecureContext should be supported");
      });

      try {
        var w3 = new Worker(http_dir + "support/parent-dedicated-worker-script.js");
        w3.onmessage = t3.step_func_done(function(e) {
          assert_unreached("cross-origin workers should not be loaded");
        });
        w3.onerror = t3.step_func_done(function(e) {
          e.preventDefault();
        });
      } catch (e) {
        // Some browsers throw for cross-origin URLs. This violates the Worker spec,
        // but isn't actually relevant to what we're testing here.
        t3.done();
      }

      var w4 = new Worker(https_dir + "support/parent-dedicated-worker-script.js");
      w4.onmessage = t4.step_func_done(function(e) {
        assert_true(e.data);
      });
      w4.onerror = t4.step_func_done(function(e) {
        assert_unreached("isSecureContext should be supported");
      });

      onmessage = function(e) {
        var data = e.data;
        if (data.type == "http") {
          t5.step(function() {
            assert_true(data.error);
          });
          t5.done();
        } else if (data.type == "https") {
          t6.step(function() {
            assert_false(data.error);
            assert_true(data.isSecureContext);
          });
          t6.done();
        } else {
          t5.step(function() {
            assert_unreached("Unknown message");
          });
          t5.done();
          t6.step(function() {
            assert_unreached("Unknown message");
          });
          t6.done();
        }
      }

      var ifr = document.createElement("iframe");
      ifr.src = https_dir + "support/https-subframe-dedicated.html";
      document.body.appendChild(ifr);
    </script>
  </body>
</html>

back to top