mirror of
https://github.com/servo/servo.git
synced 2025-08-08 15:05:35 +01:00
Update web-platform-tests to revision 76ef43a54441ca53b6931dd714eb9124404bff76
This commit is contained in:
parent
a2b195aff8
commit
b0f3d082ab
21 changed files with 183 additions and 199 deletions
|
@ -0,0 +1,50 @@
|
|||
<!DOCTYPE html>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script>
|
||||
|
||||
const videoElementTests =
|
||||
[
|
||||
{
|
||||
createDetector: () => { return new FaceDetector(); },
|
||||
name: "Face - detect(HTMLVideoElement)",
|
||||
},
|
||||
{
|
||||
createDetector: () => { return new BarcodeDetector(); },
|
||||
name: "Barcode - detect(HTMLVideoElement)",
|
||||
}
|
||||
];
|
||||
|
||||
for (let videoElementTest of videoElementTests) {
|
||||
|
||||
// Detector's detect() rejects on a HAVE_NOTHING HTMLVideoElement.
|
||||
promise_test(async t => {
|
||||
const video = document.createElement("video");
|
||||
video.src = "";
|
||||
const videoWatcher = new EventWatcher(t, video, ["play", "error"]);
|
||||
video.load();
|
||||
await videoWatcher.wait_for("error");
|
||||
assert_equals(video.readyState, video.HAVE_NOTHING);
|
||||
|
||||
const detector = videoElementTest.createDetector();
|
||||
await promise_rejects(t, 'InvalidStateError', detector.detect(video));
|
||||
}, `${videoElementTest.name} - HAVE_NOTHING`);
|
||||
|
||||
// Detector's detect() rejects on a HAVE_METADATA HTMLVideoElement.
|
||||
promise_test(async t => {
|
||||
const video = document.createElement("video");
|
||||
video.src = "/media/white.webm";
|
||||
video.loop = true;
|
||||
video.autoplay = true;
|
||||
const videoWatcher = new EventWatcher(t, video, ["loadedmetadata", "error"]);
|
||||
video.load();
|
||||
await videoWatcher.wait_for("loadedmetadata");
|
||||
assert_equals(video.readyState, video.HAVE_METADATA);
|
||||
|
||||
const detector = videoElementTest.createDetector();
|
||||
await promise_rejects(t, 'InvalidStateError', detector.detect(video));
|
||||
}, `${videoElementTest.name} - HAVE_METADATA`);
|
||||
|
||||
}
|
||||
|
||||
</script>
|
|
@ -30,9 +30,9 @@ for (let crossOriginTest of crossOriginTests) {
|
|||
img.src = IMAGE_URL;
|
||||
await imgWatcher.wait_for("load");
|
||||
const detector = crossOriginTest.createDetector();
|
||||
promise_rejects(t, "SecurityError", detector.detect(img));
|
||||
}, crossOriginTest.detectorType
|
||||
+ " should reject cross-origin HTMLImageElements with a SecurityError.");
|
||||
await promise_rejects(t, "SecurityError", detector.detect(img));
|
||||
}, `${crossOriginTest.detectorType} should reject cross-origin \
|
||||
HTMLImageElements with a SecurityError.`);
|
||||
|
||||
// Verifies that Detector rejects a cross-origin ImageBitmap.
|
||||
promise_test(async t => {
|
||||
|
@ -42,9 +42,9 @@ for (let crossOriginTest of crossOriginTests) {
|
|||
await imgWatcher.wait_for("load");
|
||||
const imgBitmap = await createImageBitmap(img);
|
||||
const detector = crossOriginTest.createDetector();
|
||||
promise_rejects(t, "SecurityError", detector.detect(imgBitmap));
|
||||
}, crossOriginTest.detectorType
|
||||
+ " should reject cross-origin ImageBitmaps with a SecurityError.");
|
||||
await promise_rejects(t, "SecurityError", detector.detect(imgBitmap));
|
||||
}, `${crossOriginTest.detectorType} should reject cross-origin \
|
||||
ImageBitmaps with a SecurityError.`);
|
||||
|
||||
// Verifies that Detector rejects a cross-origin HTMLVideoElement.
|
||||
promise_test(async t => {
|
||||
|
@ -53,9 +53,22 @@ for (let crossOriginTest of crossOriginTests) {
|
|||
video.src = VIDEO_URL;
|
||||
await videoWatcher.wait_for("loadeddata");
|
||||
const detector = crossOriginTest.createDetector();
|
||||
promise_rejects(t, "SecurityError", detector.detect(video));
|
||||
}, crossOriginTest.detectorType
|
||||
+ " should reject cross-origin HTMLVideoElements with a SecurityError.");
|
||||
await promise_rejects(t, "SecurityError", detector.detect(video));
|
||||
}, `${crossOriginTest.detectorType} should reject cross-origin \
|
||||
HTMLVideoElements with a SecurityError.`);
|
||||
|
||||
// Verifies that Detector rejects a cross-origin HTMLCanvasElement.
|
||||
promise_test(async t => {
|
||||
const img = new Image();
|
||||
const imgWatcher = new EventWatcher(t, img, ["load", "error"]);
|
||||
img.src = IMAGE_URL;
|
||||
await imgWatcher.wait_for("load");
|
||||
const canvas = document.createElement("canvas");
|
||||
canvas.getContext("2d").drawImage(img, 0, 0);
|
||||
const detector = crossOriginTest.createDetector();
|
||||
await promise_rejects(t, "SecurityError", detector.detect(canvas));
|
||||
}, `${crossOriginTest.detectorType} should reject cross-origin \
|
||||
HTMLCanvasElement with a SecurityError.`);
|
||||
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue