File: Service-Worker-Allowed-header.https.html

package info (click to toggle)
thunderbird 1%3A128.14.0esr-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 4,334,824 kB
  • sloc: cpp: 7,391,917; javascript: 5,617,271; ansic: 3,833,216; python: 1,230,742; xml: 619,690; asm: 456,022; java: 179,892; sh: 118,796; makefile: 21,908; perl: 14,825; objc: 12,399; yacc: 4,583; pascal: 2,973; lex: 1,720; ruby: 1,190; exp: 762; sql: 674; awk: 580; php: 436; lisp: 430; sed: 70; csh: 10
file content (88 lines) | stat: -rw-r--r-- 3,216 bytes parent folder | download | duplicates (27)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
<!DOCTYPE html>
<title>Service Worker: Service-Worker-Allowed header</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/get-host-info.sub.js"></script>
<script src="resources/test-helpers.sub.js"></script>
<script>

const host_info = get_host_info();

// Returns a URL for a service worker script whose Service-Worker-Allowed
// header value is set to |allowed_path|. If |origin| is specified, that origin
// is used.
function build_script_url(allowed_path, origin) {
  const script = 'resources/empty-worker.js';
  const url = origin ? `${origin}${base_path()}${script}` : script;
  return `${url}?pipe=header(Service-Worker-Allowed,${allowed_path})`;
}

// register_test is a promise_test that registers a service worker.
function register_test(script, scope, description) {
  promise_test(async t => {
    t.add_cleanup(() => {
      return service_worker_unregister(t, scope);
    });

    const registration = await service_worker_unregister_and_register(
        t, script, scope);
    assert_true(registration instanceof ServiceWorkerRegistration, 'registered');
    assert_equals(registration.scope, normalizeURL(scope));
  }, description);
}

// register_fail_test is like register_test but expects a SecurityError.
function register_fail_test(script, scope, description) {
  promise_test(async t => {
    t.add_cleanup(() => {
      return service_worker_unregister(t, scope);
    });

    await service_worker_unregister(t, scope);
    await promise_rejects_dom(t,
                          'SecurityError',
                          navigator.serviceWorker.register(script, {scope}));
  }, description);
}

register_test(
    build_script_url('/allowed-path'),
    '/allowed-path',
    'Registering within Service-Worker-Allowed path');

register_test(
    build_script_url(new URL('/allowed-path', document.location)),
    '/allowed-path',
    'Registering within Service-Worker-Allowed path (absolute URL)');

register_test(
    build_script_url('../allowed-path-with-parent'),
    'allowed-path-with-parent',
    'Registering within Service-Worker-Allowed path with parent reference');

register_fail_test(
    build_script_url('../allowed-path'),
    '/disallowed-path',
    'Registering outside Service-Worker-Allowed path'),

register_fail_test(
    build_script_url('../allowed-path-with-parent'),
    '/allowed-path-with-parent',
    'Registering outside Service-Worker-Allowed path with parent reference');

register_fail_test(
    build_script_url(host_info.HTTPS_REMOTE_ORIGIN + '/'),
    'resources/this-scope-is-normally-allowed',
    'Service-Worker-Allowed is cross-origin to script, registering on a normally allowed scope');

register_fail_test(
    build_script_url(host_info.HTTPS_REMOTE_ORIGIN + '/'),
    '/this-scope-is-normally-disallowed',
    'Service-Worker-Allowed is cross-origin to script, registering on a normally disallowed scope');

register_fail_test(
    build_script_url(host_info.HTTPS_REMOTE_ORIGIN + '/cross-origin/',
                     host_info.HTTPS_REMOTE_ORIGIN),
    '/cross-origin/',
    'Service-Worker-Allowed is cross-origin to page, same-origin to script');
</script>