Commit 4d8458e2 authored by Chromium WPT Sync's avatar Chromium WPT Sync Committed by Commit Bot

Import wpt@b0efb74111af13f7abf3b3b1860667f98746b07f

Using wpt-import in Chromium 0598d65f.
With Chromium commits locally applied on WPT:
23705631 "service worker: Upstream sandboxed iframe test to WPT."


Build: https://build.chromium.org/p/chromium.infra.cron/builders/wpt-importer/builds/5391

Note to sheriffs: This CL imports external tests and adds
expectations for those tests; if this CL is large and causes
a few new failures, please fix the failures by adding new
lines to TestExpectations rather than reverting. See:
https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md

Directory owners for changes in this CL:
domenic@chromium.org, ricea@chromium.org, tyoshino@chromium.org:
  external/wpt/streams
eroman@chromium.org, rsleevi@chromium.org:
  external/wpt/WebCryptoAPI

TBR=lukebjerring

No-Export: true
Change-Id: Ibad768af8e96681edddac88dbb638f0ca2056e0c
Reviewed-on: https://chromium-review.googlesource.com/777921
Commit-Queue: Blink WPT Bot <blink-w3c-test-autoroller@chromium.org>
Reviewed-by: default avatarBlink WPT Bot <blink-w3c-test-autoroller@chromium.org>
Cr-Commit-Position: refs/heads/master@{#517703}
parent 651b0c34
......@@ -2328,7 +2328,6 @@ crbug.com/591099 external/wpt/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.
crbug.com/591099 external/wpt/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.html [ Timeout ]
crbug.com/591099 external/wpt/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.html [ Timeout ]
crbug.com/591099 external/wpt/WebCryptoAPI/generateKey/successes.worker.html [ Timeout ]
crbug.com/591099 external/wpt/WebCryptoAPI/generateKey/test_failures.https.html [ Crash Pass Timeout ]
crbug.com/591099 external/wpt/WebCryptoAPI/generateKey/test_failures_AES-CBC.https.html [ Pass Timeout ]
crbug.com/591099 external/wpt/WebCryptoAPI/generateKey/test_failures_AES-CTR.https.html [ Pass Timeout ]
crbug.com/591099 external/wpt/WebCryptoAPI/generateKey/test_failures_AES-GCM.https.html [ Pass Timeout ]
......
......@@ -2062,6 +2062,9 @@ crbug.com/751952 virtual/mojo-loading/http/tests/devtools/unit/datagrid-editable
crbug.com/751952 virtual/origin-trials-runtimeflags-disabled/http/tests/origin_trials/webexposed/budget-api-origin-trial-interfaces.html [ Pass Failure ]
# ====== New tests from wpt-importer added here ======
crbug.com/626703 external/wpt/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.worker.html [ Timeout ]
crbug.com/626703 external/wpt/WebCryptoAPI/generateKey/successes_RSA-PSS.https.worker.html [ Timeout ]
crbug.com/626703 external/wpt/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.worker.html [ Timeout ]
crbug.com/626703 external/wpt/html/rendering/non-replaced-elements/the-page/body-margin-1i.html [ Failure ]
crbug.com/626703 external/wpt/html/rendering/non-replaced-elements/the-page/body-margin-1j.html [ Failure ]
crbug.com/626703 external/wpt/html/rendering/non-replaced-elements/the-page/body-margin-1k.html [ Failure ]
......@@ -3838,7 +3841,6 @@ crbug.com/757698 external/wpt/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.
crbug.com/757698 external/wpt/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.html [ Skip ]
crbug.com/757698 external/wpt/WebCryptoAPI/generateKey/test_aes-cbc.https.html [ Skip ]
crbug.com/757698 external/wpt/WebCryptoAPI/generateKey/test_aes-ctr.https.html [ Skip ]
crbug.com/757698 external/wpt/WebCryptoAPI/generateKey/test_failures.https.html [ Skip ]
crbug.com/757698 external/wpt/WebCryptoAPI/generateKey/test_failures_AES-CBC.https.html [ Skip ]
crbug.com/757698 external/wpt/WebCryptoAPI/generateKey/test_failures_AES-CTR.https.html [ Skip ]
crbug.com/757698 external/wpt/WebCryptoAPI/generateKey/test_failures_AES-GCM.https.html [ Skip ]
......
importScripts("/resources/testharness.js");
importScripts("../util/helpers.js");
importScripts("failures.js");
run_test();
done();
importScripts("/resources/testharness.js");
importScripts("../util/helpers.js");
importScripts("successes.js");
run_test();
done();
This is a testharness.js-based test.
PASS Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey])
PASS Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey])
PASS Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey])
PASS Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey])
PASS Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
PASS Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
FAIL Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
PASS Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey])
PASS Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey])
PASS Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey])
PASS Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey])
PASS Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
PASS Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
PASS Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey])
PASS Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey])
PASS Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey])
PASS Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey])
PASS Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
PASS Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
FAIL Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
PASS Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey])
PASS Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey])
PASS Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey])
PASS Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey])
PASS Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
PASS Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
PASS Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey])
PASS Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey])
PASS Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey])
PASS Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey])
PASS Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
PASS Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
FAIL Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
FAIL Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) assert_unreached: Threw an unexpected error: OperationError: 192-bit AES keys are not supported Reached unreachable code
PASS Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey])
PASS Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey])
PASS Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey])
PASS Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey])
PASS Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey])
PASS Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
PASS Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
Harness: the test ran to completion.
<!DOCTYPE html>
<meta charset=utf-8>
<meta name="timeout" content="long">
<title>WebCryptoAPI: generateKey() for Failures</title>
<link rel="author" title="Charles Engelke" href="mailto:w3c@engelke.com">
<link rel="help" href="https://www.w3.org/TR/WebCryptoAPI/#dfn-SubtleCrypto-method-generateKey">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/WebCryptoAPI/util/helpers.js"></script>
<script src="failures.js"></script>
<h1>generateKey Tests for Bad Parameters</h1>
<div id="log"></div>
<script>
run_test();
</script>
......@@ -19,5 +19,5 @@
<div id="log"></div>
<script>
run_test(["RSA-OAEP"], true);
</script>
run_test(["RSA-OAEP"]);
</script>
\ No newline at end of file
......@@ -66,10 +66,10 @@ done();"""
names = ["AES-CTR", "AES-CBC", "AES-GCM", "AES-KW", "HMAC", "RSASSA-PKCS1-v1_5",
"RSA-PSS", "RSA-OAEP", "ECDSA", "ECDH"]
for filename_pattern, template in [("test_successes_%s.html", successes_html),
("test_failures_%s.html", failures_html),
("successes_%s.worker.js", successes_worker),
("failures_%s.worker.js", failures_worker)]:
for filename_pattern, template in [("test_successes_%s.https.html", successes_html),
("test_failures_%s.https.html", failures_html),
("successes_%s.https.worker.js", successes_worker),
("failures_%s.https.worker.js", failures_worker)]:
for name in names:
path = os.path.join(here, os.pardir, "generateKey", filename_pattern % name)
with open(path, "w") as f:
......
......@@ -207,6 +207,20 @@ promise_test(t => {
}, 'ReadableStream teeing: failing to cancel the original stream should cause cancel() to reject on branches');
test(t => {
let controller;
const stream = new ReadableStream({ start(c) { controller = c; } });
const [branch1, branch2] = stream.tee();
const promise = controller.error("error");
branch1.cancel().catch(_=>_);
branch2.cancel().catch(_=>_);
return promise;
}, 'ReadableStream teeing: erroring a teed stream should properly handle canceled branches');
promise_test(() => {
let controller;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment