Commit ea584430 authored by Hiroshige Hayashizaki's avatar Hiroshige Hayashizaki Committed by Commit Bot

[WPT] Check origin used in module import in dedicated workers

DedicatedWorker version of WPTs added in:
https://chromium-review.googlesource.com/c/chromium/src/+/2046803
https://github.com/web-platform-tests/wpt/pull/21836

Bug: None
Change-Id: Ic18e09f7855bc234b6179ae24b54a8d0473551aa
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2462910
Commit-Queue: Hiroshige Hayashizaki <hiroshige@chromium.org>
Reviewed-by: default avatarHiroki Nakagawa <nhiroki@chromium.org>
Cr-Commit-Position: refs/heads/master@{#827538}
parent 72ee4235
<!DOCTYPE html>
<title>DedicatedWorker: ES modules for data URL workers</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script>
const import_from_data_url_worker_test = (importType, isDataURL, expectation) => {
promise_test(async () => {
const importURL = new URL(`resources/${importType}-import-` +
`${isDataURL ? 'data-url' : 'script'}-block-cross-origin.js`,
location.href) + '?pipe=header(Access-Control-Allow-Origin, *)';
const dataURL = `data:text/javascript,import "${importURL}";`;
const worker = new Worker(dataURL, { type: 'module' });
worker.postMessage('Send message for tests from main script.');
const msgEvent =
await new Promise(resolve => worker.onmessage = resolve);
assert_array_equals(msgEvent.data,
expectation === 'blocked' ? ['ERROR']
: ['export-block-cross-origin.js']);
}, `${importType} import ${isDataURL ? 'data url' : 'script'} from data: ` +
`URL should be ${expectation}.`);
}
// Static import should obey the outside settings.
// SecurityOrigin of the outside settings is decided by Window.
import_from_data_url_worker_test('static', true, 'allowed');
import_from_data_url_worker_test('static', false, 'allowed');
// Dynamic import should obey the inside settings.
// SecurityOrigin of the inside settings is a unique opaque origin.
//
// Data url script is cross-origin to the inside settings' SecurityOrigin, but
// dynamic importing it is allowed.
// https://fetch.spec.whatwg.org/#concept-main-fetch
// Step 5: request’s current URL’s scheme is "data" [spec text]
import_from_data_url_worker_test('dynamic', true, 'allowed');
// Non-data url script is cross-origin to the inside settings' SecurityOrigin.
// It should be blocked.
import_from_data_url_worker_test('dynamic', false, 'blocked');
</script>
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment