File: window-domain-failure.https.sub.html

package info (click to toggle)
firefox-esr 115.14.0esr-1~deb11u1
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 3,659,200 kB
  • sloc: cpp: 6,676,648; javascript: 5,690,850; ansic: 3,328,545; python: 1,120,605; asm: 397,163; xml: 180,531; java: 178,838; sh: 68,930; makefile: 20,999; perl: 12,595; objc: 12,561; yacc: 4,583; cs: 3,846; pascal: 2,840; lex: 1,720; ruby: 1,079; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (49 lines) | stat: -rw-r--r-- 1,901 bytes parent folder | download | duplicates (16)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
<!DOCTYPE html>
<meta charset="utf-8">
<title>Structured cloning of SharedArrayBuffers into same-origin-domain windows</title>
<link rel="help" href="https://html.spec.whatwg.org/multipage/#structuredserialize">
<link rel="author" title="Domenic Denicola" href="mailto:d@domenic.me">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<body>
<script>
"use strict";
document.domain = "{{host}}";

async_test(t => {
  const iframe = document.createElement("iframe");
  t.add_cleanup(() => iframe.remove());
  iframe.src = "//{{domains[www1]}}:{{location[port]}}/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/resources/iframe-domain-failure.sub.html";
  let domain;
  let childCrossOriginIsolated;
  window.onmessage = t.step_func((e) => {
    if (e.data.name === "domain") {
      domain = e.data.value;
      return;
    }
    if (e.data.name === "crossOriginIsolated") {
      childCrossOriginIsolated = e.data.value;
      return;
    }
    if (e.data.name === "hasSharedArrayBuffer") {
      const hasSharedArrayBuffer = e.data.value;

      // document.domain mutation is no-op because the surrounding agent
      // cluster's cross-origin isolated is true.
      assert_equals(domain, "{{domains[www1]}}");

      // crossOriginIsolated is false in the nested frame because the frame is
      // cross-origin and hence the cross-origin isolated capability is false.
      // We use assert_equals instead of assert_false here to see if
      // `childCrossOriginIsolated` is set.
      assert_equals(childCrossOriginIsolated, false);

      assert_false(hasSharedArrayBuffer);
      t.done();
      return;
    }
    assert_unreached("Got a message event, expected a messageerror event");
  });
  document.body.append(iframe);
}, "SharedArrayBuffer and a same-origin-domain (but not same-origin) iframe");
</script>