File: resource-timing-cross-origin.https.html

package info (click to toggle)
thunderbird 1%3A128.14.0esr-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 4,334,824 kB
  • sloc: cpp: 7,391,917; javascript: 5,617,271; ansic: 3,833,216; python: 1,230,742; xml: 619,690; asm: 456,022; java: 179,892; sh: 118,796; makefile: 21,908; perl: 14,825; objc: 12,399; yacc: 4,583; pascal: 2,973; lex: 1,720; ruby: 1,190; exp: 762; sql: 674; awk: 580; php: 436; lisp: 430; sed: 70; csh: 10
file content (46 lines) | stat: -rw-r--r-- 2,453 bytes parent folder | download | duplicates (19)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
<!DOCTYPE HTML>
<html>
<head>
<meta charset="utf-8" />
<title>This test validates Resource Timing for cross origin content fetched by Service Worker from an originally same-origin URL.</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/get-host-info.sub.js"></script>
<script src="resources/test-helpers.sub.js"></script>
</head>

<body>
<script>
function test_sw_resource_timing({ mode }) {
    promise_test(async t => {
      const worker_url = `resources/worker-fetching-cross-origin.js?mode=${mode}`;
      const scope = 'resources/iframe-with-image.html';
      const registration = await service_worker_unregister_and_register(t, worker_url, scope);
      await wait_for_state(t, registration.installing, 'activated');
      const frame = await with_iframe(scope);
      const frame_performance = frame.contentWindow.performance;
      // Check that there is one entry for which the timing allow check algorithm failed.
      const entries = frame_performance.getEntriesByType('resource');
      assert_equals(entries.length, 1);
      const entry = entries[0];
      assert_equals(entry.redirectStart, 0, 'redirectStart should be 0 in cross-origin request.');
      assert_equals(entry.redirectEnd, 0, 'redirectEnd should be 0 in cross-origin request.');
      assert_equals(entry.domainLookupStart, entry.fetchStart, 'domainLookupStart should be 0 in cross-origin request.');
      assert_equals(entry.domainLookupEnd, entry.fetchStart, 'domainLookupEnd should be 0 in cross-origin request.');
      assert_equals(entry.connectStart, entry.fetchStart, 'connectStart should be 0 in cross-origin request.');
      assert_equals(entry.connectEnd, entry.fetchStart, 'connectEnd should be 0 in cross-origin request.');
      assert_greater_than(entry.responseStart, entry.fetchStart, 'responseStart should be 0 in cross-origin request.');
      assert_equals(entry.secureConnectionStart, entry.fetchStart, 'secureConnectionStart should be 0 in cross-origin request.');
      assert_equals(entry.transferSize, 0, 'decodedBodySize should be 0 in cross-origin request.');
      frame.remove();
      await registration.unregister();
  }, `Test that timing allow check fails when service worker changes origin from same to cross origin (${mode}).`);
}

test_sw_resource_timing({ mode: "cors" });
test_sw_resource_timing({ mode: "no-cors" });


</script>
</body>
</html>