Source code
Revision control
Copy as Markdown
Other Tools
Test Info: Warnings
- This test has a WPT meta file that expects 7 subtest issues.
- This WPT test may be referenced by the following Test IDs:
- /html/document-isolation-policy/shared-workers.tentative.https.html - WPT Dashboard Interop Dashboard
<!doctype html>
<html>
<meta charset="utf-8">
<title>COEP - policy derivation for Shared Workers</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/get-host-info.sub.js"></script>
<script src="resources/worker-support.js"></script>
<body>
<p>Verify the Document Isolation Policy for Shared Workers by performing a
cross-origin "fetch" request for a resource that does not specify CORP. Only
Shared Workers with the default DIP should be able to successfully perform
this operation.</p>
<script>
'use strict';
function makeWorkerUrl(options) {
return resolveUrl("resources/shared-worker-fetch.js.py", options);
}
/**
* Create a Shared Worker within an iframe
*
* @param {object} t - a testharness.js subtest instance (used to reset global
* state)
* @param {string} url - the URL from which the Shared Worker should be
* created
* @param {string} options.ownerDip - the Document Isolation Policy of the
iframe
*/
async function createWorker(t, url, options) {
const { ownerDip } = options || {};
const frameUrl = resolveUrl("/common/blank.html", { dip: ownerDip });
const iframe = await withIframe(t, frameUrl);
const sw = new iframe.contentWindow.SharedWorker(url);
sw.onerror = t.unreached_func('SharedWorker.onerror should not be called');
await new Promise((resolve) => {
sw.port.addEventListener('message', resolve, { once: true });
sw.port.start();
});
return sw;
}
/**
* Instruct a Shared Worker to fetch from a specified URL and report on the
* success of the operation.
*
* @param {SharedWorker} worker
* @param {string} url - the URL that the worker should fetch
*/
function fetchFromWorker(worker, url) {
return new Promise((resolve) => {
worker.port.postMessage(url);
worker.port.addEventListener(
'message', (event) => resolve(event.data), { once: true }
);
});
};
promise_test(async (t) => {
const worker = await createWorker(t, makeWorkerUrl());
const result = await fetchFromWorker(worker,
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'success');
}, 'default policy (derived from response)');
promise_test(async (t) => {
const worker = await createWorker(t, makeWorkerUrl({ dip: 'isolate-and-require-corp' }));
const result = await fetchFromWorker(worker,
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'failure');
}, '"isolate-and-require-corp" (derived from response)');
promise_test(async (t) => {
const blobUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
scheme: "blob",
});
const workers = await Promise.all([
createWorker(t, blobUrl),
createWorker(t, blobUrl),
createWorker(t, blobUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'success');
}, 'default policy (derived from owner set due to use of local scheme - blob URL)');
promise_test(async (t) => {
const blobUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
creatorDip: "isolate-and-require-corp",
scheme: "blob",
});
const workers = await Promise.all([
createWorker(t, blobUrl),
createWorker(t, blobUrl),
createWorker(t, blobUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'failure');
}, 'isolate-and-require-corp (derived from blob URL creator)');
promise_test(async (t) => {
const blobUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
scheme: "blob",
});
const workers = await Promise.all([
createWorker(t, blobUrl),
createWorker(t, blobUrl, { ownerDip: 'isolate-and-require-corp' }),
createWorker(t, blobUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'failure');
}, '"isolate-and-require-corp" (derived from owner set due to use of local scheme - blob URL)');
promise_test(async (t) => {
const dataUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
scheme: "data",
});
const workers = await Promise.all([
createWorker(t, dataUrl),
createWorker(t, dataUrl),
createWorker(t, dataUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'success');
}, 'default policy (derived from owner set due to use of local scheme - data URL)');
promise_test(async (t) => {
const dataUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
creatorDip: "isolate-and-require-corp",
scheme: "data",
});
const workers = await Promise.all([
createWorker(t, dataUrl),
createWorker(t, dataUrl),
createWorker(t, dataUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'success');
}, 'default policy (not derived from data URL creator)');
promise_test(async (t) => {
const dataUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
scheme: "data",
});
const workers = await Promise.all([
createWorker(t, dataUrl),
createWorker(t, dataUrl, { ownerdip: 'isolate-and-require-corp' }),
createWorker(t, dataUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'failure');
}, '"isolate-and-require-corp" (derived from owner set due to use of local scheme - data URL)');
promise_test(async (t) => {
const filesystemUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
scheme: "filesystem",
});
const workers = await Promise.all([
createWorker(t, filesystemUrl),
createWorker(t, filesystemUrl),
createWorker(t, filesystemUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'success');
}, 'default policy (derived from owner set due to use of local scheme - filesystem URL)');
promise_test(async (t) => {
const filesystemUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
creatorDip: "isolate-and-require-corp",
scheme: "filesystem",
});
const workers = await Promise.all([
createWorker(t, filesystemUrl),
createWorker(t, filesystemUrl),
createWorker(t, filesystemUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'failure');
}, 'isolate-and-require-corp (derived from filesystem URL creator)');
promise_test(async (t) => {
const filesystemUrl = await createLocalUrl(t, {
url: makeWorkerUrl(),
scheme: "filesystem",
});
const workers = await Promise.all([
createWorker(t, filesystemUrl),
createWorker(t, filesystemUrl, { ownerDip: 'isolate-and-require-corp' }),
createWorker(t, filesystemUrl),
]);
const result = await fetchFromWorker(workers[0],
get_host_info().HTTPS_REMOTE_ORIGIN+"/html/document-isolation-policy/resources/nothing-no-corp.js");
assert_equals(result, 'failure');
}, '"isolate-and-require-corp" (derived from owner set due to use of local scheme - filesystem URL)');
</script>
</body>
</html>