mirror of
https://github.com/servo/servo.git
synced 2025-08-15 18:35:33 +01:00
Update web-platform-tests to revision e8bfc205e36ad699601212cd50083870bad9a75d
This commit is contained in:
parent
65dd6d4340
commit
ccdb0a3458
1428 changed files with 118036 additions and 9786 deletions
|
@ -0,0 +1,83 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Test WorkerGlobalScope.isSecureContext for HTTP creator</title>
|
||||
<meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object">
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="server-locations.sub.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
var t1 = async_test("HTTP worker");
|
||||
var t2 = async_test("HTTPS worker");
|
||||
var t3 = async_test("HTTP nested worker");
|
||||
var t4 = async_test("HTTPS nested worker");
|
||||
var t5 = async_test("HTTP worker from HTTPS subframe");
|
||||
var t6 = async_test("HTTPS worker from HTTPS subframe");
|
||||
|
||||
var w1 = new Worker(http_dir + "support/dedicated-worker-script.js");
|
||||
w1.onmessage = t1.step_func_done(function(e) {
|
||||
assert_false(e.data);
|
||||
});
|
||||
w1.onerror = t1.step_func_done(function(e) {
|
||||
assert_unreached("isSecureContext should be supported");
|
||||
});
|
||||
|
||||
var w2 = new Worker(https_dir + "support/dedicated-worker-script.js");
|
||||
w2.onmessage = t2.step_func_done(function(e) {
|
||||
assert_unreached("cross-origin workers should not be loaded");
|
||||
});
|
||||
w2.onerror = t2.step_func_done(function(e) {
|
||||
e.preventDefault();
|
||||
});
|
||||
|
||||
var w3 = new Worker(http_dir + "support/parent-dedicated-worker-script.js");
|
||||
w3.onmessage = t3.step_func_done(function(e) {
|
||||
assert_false(e.data);
|
||||
});
|
||||
w3.onerror = t3.step_func_done(function(e) {
|
||||
assert_unreached("isSecureContext should be supported");
|
||||
});
|
||||
|
||||
var w4 = new Worker(https_dir + "support/parent-dedicated-worker-script.js");
|
||||
w4.onmessage = t4.step_func_done(function(e) {
|
||||
assert_unreached("cross-origin workers should not be loaded");
|
||||
});
|
||||
w4.onerror = t4.step_func_done(function(e) {
|
||||
e.preventDefault();
|
||||
});
|
||||
|
||||
onmessage = function(e) {
|
||||
var data = e.data;
|
||||
if (data.type == "http") {
|
||||
t5.step(function() {
|
||||
assert_true(data.error);
|
||||
});
|
||||
t5.done();
|
||||
} else if (data.type == "https") {
|
||||
t6.step(function() {
|
||||
assert_false(data.error);
|
||||
assert_false(data.isSecureContext);
|
||||
});
|
||||
t6.done();
|
||||
} else {
|
||||
t5.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t5.done();
|
||||
t6.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t6.done();
|
||||
}
|
||||
}
|
||||
|
||||
var ifr = document.createElement("iframe");
|
||||
ifr.src = https_dir + "support/https-subframe-dedicated.html";
|
||||
document.body.appendChild(ifr);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,83 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Test WorkerGlobalScope.isSecureContext for HTTPS creator</title>
|
||||
<meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object">
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="server-locations.sub.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
var t1 = async_test("HTTP worker");
|
||||
var t2 = async_test("HTTPS worker");
|
||||
var t3 = async_test("HTTP nested worker");
|
||||
var t4 = async_test("HTTPS nested worker");
|
||||
var t5 = async_test("HTTP worker from HTTPS subframe");
|
||||
var t6 = async_test("HTTPS worker from HTTPS subframe");
|
||||
|
||||
var w1 = new Worker(http_dir + "support/dedicated-worker-script.js");
|
||||
w1.onmessage = t1.step_func_done(function(e) {
|
||||
assert_unreached("cross-origin workers should not be loaded");
|
||||
});
|
||||
w1.onerror = t1.step_func_done(function(e) {
|
||||
e.preventDefault();
|
||||
});
|
||||
|
||||
var w2 = new Worker(https_dir + "support/dedicated-worker-script.js");
|
||||
w2.onmessage = t2.step_func_done(function(e) {
|
||||
assert_true(e.data);
|
||||
});
|
||||
w2.onerror = t2.step_func_done(function(e) {
|
||||
assert_unreached("isSecureContext should be supported");
|
||||
});
|
||||
|
||||
var w3 = new Worker(http_dir + "support/parent-dedicated-worker-script.js");
|
||||
w3.onmessage = t3.step_func_done(function(e) {
|
||||
assert_unreached("cross-origin workers should not be loaded");
|
||||
});
|
||||
w3.onerror = t3.step_func_done(function(e) {
|
||||
e.preventDefault();
|
||||
});
|
||||
|
||||
var w4 = new Worker(https_dir + "support/parent-dedicated-worker-script.js");
|
||||
w4.onmessage = t4.step_func_done(function(e) {
|
||||
assert_true(e.data);
|
||||
});
|
||||
w4.onerror = t4.step_func_done(function(e) {
|
||||
assert_unreached("isSecureContext should be supported");
|
||||
});
|
||||
|
||||
onmessage = function(e) {
|
||||
var data = e.data;
|
||||
if (data.type == "http") {
|
||||
t5.step(function() {
|
||||
assert_true(data.error);
|
||||
});
|
||||
t5.done();
|
||||
} else if (data.type == "https") {
|
||||
t6.step(function() {
|
||||
assert_false(data.error);
|
||||
assert_true(data.isSecureContext);
|
||||
});
|
||||
t6.done();
|
||||
} else {
|
||||
t5.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t5.done();
|
||||
t6.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t6.done();
|
||||
}
|
||||
}
|
||||
|
||||
var ifr = document.createElement("iframe");
|
||||
ifr.src = https_dir + "support/https-subframe-dedicated.html";
|
||||
document.body.appendChild(ifr);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,69 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Test SharedWorkerGlobalScope.isSecureContext for HTTP creator</title>
|
||||
<meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object">
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="server-locations.sub.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
var t1 = async_test("Shared worker");
|
||||
var t2 = async_test("Nested worker in shared worker");
|
||||
var t3 = async_test("Shared worker from https subframe");
|
||||
var t4 = async_test("Nested worker from shared worker from https subframe");
|
||||
// Tests for SharedWorkers used from other workers (not supported right
|
||||
// now) would go here.
|
||||
|
||||
t1.step(function() {
|
||||
var w = new SharedWorker("support/shared-worker-script.js");
|
||||
w.port.onmessage = t1.step_func_done(function(e) {
|
||||
assert_false(e.data);
|
||||
});
|
||||
w.port.start();
|
||||
});
|
||||
|
||||
t2.step(function() {
|
||||
var w = new SharedWorker("support/parent-shared-worker-script.js");
|
||||
w.port.onmessage = t2.step_func_done(function(e) {
|
||||
assert_false(e.data);
|
||||
});
|
||||
w.port.start();
|
||||
});
|
||||
|
||||
onmessage = function(e) {
|
||||
var data = e.data;
|
||||
if (data.type == "shared") {
|
||||
t3.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_false(data.error);
|
||||
assert_false(data.isSecureContext);
|
||||
});
|
||||
t3.done();
|
||||
} else if (data.type == "nested") {
|
||||
t4.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_false(data.error);
|
||||
assert_false(data.isSecureContext);
|
||||
});
|
||||
t4.done();
|
||||
} else {
|
||||
t3.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t3.done();
|
||||
t4.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t4.done();
|
||||
}
|
||||
}
|
||||
|
||||
var ifr = document.createElement("iframe");
|
||||
ifr.src = https_dir2 + "support/https-subframe-shared.html";
|
||||
document.body.appendChild(ifr);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,67 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Test SharedWorkerGlobalScope.isSecureContext for HTTP creator</title>
|
||||
<meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object">
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="server-locations.sub.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
var t1 = async_test("Shared worker");
|
||||
var t2 = async_test("Nested worker in shared worker");
|
||||
var t3 = async_test("Shared worker from https subframe");
|
||||
var t4 = async_test("Nested worker from shared worker from https subframe");
|
||||
|
||||
t1.step(function() {
|
||||
var w = new SharedWorker("support/shared-worker-script.js");
|
||||
w.port.onmessage = t1.step_func_done(function(e) {
|
||||
assert_true(e.data);
|
||||
});
|
||||
w.port.start();
|
||||
});
|
||||
|
||||
t2.step(function() {
|
||||
var w = new SharedWorker("support/parent-shared-worker-script.js");
|
||||
w.port.onmessage = t2.step_func_done(function(e) {
|
||||
assert_true(e.data);
|
||||
});
|
||||
w.port.start();
|
||||
});
|
||||
|
||||
onmessage = function(e) {
|
||||
var data = e.data;
|
||||
if (data.type == "shared") {
|
||||
t3.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_false(data.error);
|
||||
assert_true(data.isSecureContext);
|
||||
});
|
||||
t3.done();
|
||||
} else if (data.type == "nested") {
|
||||
t4.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_false(data.error);
|
||||
assert_true(data.isSecureContext);
|
||||
});
|
||||
t4.done();
|
||||
} else {
|
||||
t3.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t3.done();
|
||||
t4.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t4.done();
|
||||
}
|
||||
}
|
||||
|
||||
var ifr = document.createElement("iframe");
|
||||
ifr.src = https_dir3 + "support/https-subframe-shared.html";
|
||||
document.body.appendChild(ifr);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -4,3 +4,14 @@ https_dir = https_dir.substr(0, https_dir.lastIndexOf("/") + 1);
|
|||
var http_dir = "http://{{location[hostname]}}:{{ports[http][0]}}{{location[path]}}";
|
||||
http_dir = http_dir.substr(0, http_dir.lastIndexOf("/") + 1);
|
||||
|
||||
var https_dir2 = "https://{{domains[www]}}:{{ports[https][0]}}{{location[path]}}";
|
||||
https_dir2 = https_dir2.substr(0, https_dir2.lastIndexOf("/") + 1);
|
||||
|
||||
var https_dir3 = "https://{{domains[www1]}}:{{ports[https][0]}}{{location[path]}}";
|
||||
https_dir3 = https_dir3.substr(0, https_dir3.lastIndexOf("/") + 1);
|
||||
|
||||
var https_dir4 = "https://{{domains[www2]}}:{{ports[https][0]}}{{location[path]}}";
|
||||
https_dir4 = https_dir4.substr(0, https_dir4.lastIndexOf("/") + 1);
|
||||
|
||||
var https_dir5 = "https://{{domains[élève]}}:{{ports[https][0]}}{{location[path]}}";
|
||||
https_dir5 = https_dir5.substr(0, https_dir5.lastIndexOf("/") + 1);
|
||||
|
|
|
@ -0,0 +1,111 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Test SharedWorkerGlobalScope.isSecureContext for HTTP creator</title>
|
||||
<meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object">
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="server-locations.sub.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
/*
|
||||
* The goal of this test is to check that we do the right thing if the
|
||||
* same SharedWorker is used first from an insecure context and then from
|
||||
* a secure context.
|
||||
*
|
||||
* To do this, we first open an insecure (http) popup, which loads a
|
||||
* subframe that is same-origin with us but not a secure context, since
|
||||
* its parent is http, not https. Then this subframe loads a SharedWorker
|
||||
* and communicates back to us whether that worker and a child dedicated
|
||||
* worker it spawns think they are secure contexts. Async tests t3 and t4
|
||||
* track these two workers.
|
||||
*
|
||||
* After we have heard from both workers in the popup, we directly load
|
||||
* the same exact subframe ourselves and see what the workers in it
|
||||
* report. Async tests t1 and t2 track these two workers.
|
||||
*/
|
||||
var t1 = async_test("Shared worker in subframe");
|
||||
var t2 = async_test("Nested worker in shared worker in subframe");
|
||||
var t3 = async_test("Shared worker in popup");
|
||||
var t4 = async_test("Nested worker from shared worker in popup");
|
||||
|
||||
var messageCount = 0;
|
||||
var popup = null;
|
||||
onmessage = function(e) {
|
||||
++messageCount;
|
||||
// Make sure to not close the popup until we've run the iframe part of
|
||||
// the test! We need to keep those shared workers alive.
|
||||
if (messageCount == 4 && popup) {
|
||||
popup.close();
|
||||
}
|
||||
var data = e.data;
|
||||
if (data.type == "shared") {
|
||||
// This is a message from our shared worker; check whether it's the
|
||||
// one in the popup or in our subframe.
|
||||
if (data.fromPopup) {
|
||||
t3.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_false(data.error);
|
||||
assert_false(data.isSecureContext);
|
||||
});
|
||||
t3.done();
|
||||
} else {
|
||||
t1.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_true(data.error);
|
||||
});
|
||||
t1.done();
|
||||
}
|
||||
} else if (data.type == "nested") {
|
||||
// This is a message from our shared worker's nested dedicated worker;
|
||||
// check whether it's the one in the popup or in our subframe.
|
||||
if (data.fromPopup) {
|
||||
t4.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_false(data.error);
|
||||
assert_false(data.isSecureContext);
|
||||
});
|
||||
t4.done();
|
||||
} else {
|
||||
t2.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_true(data.error);
|
||||
});
|
||||
t2.done();
|
||||
}
|
||||
} else {
|
||||
if (popup) {
|
||||
popup.close();
|
||||
}
|
||||
t1.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t1.done();
|
||||
t2.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t2.done();
|
||||
t3.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t3.done();
|
||||
t4.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t4.done();
|
||||
}
|
||||
|
||||
if (messageCount == 2) {
|
||||
// Got both messages from our popup; time to create our child.
|
||||
var ifr = document.createElement("iframe");
|
||||
ifr.src = https_dir5 + "support/https-subframe-shared.html";
|
||||
document.body.appendChild(ifr);
|
||||
}
|
||||
}
|
||||
|
||||
popup = window.open(http_dir + "support/shared-worker-insecure-popup.html?https_dir5");
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,111 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Test SharedWorkerGlobalScope.isSecureContext for HTTP creator</title>
|
||||
<meta name="help" href="https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object">
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="server-locations.sub.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
/*
|
||||
* The goal of this test is to check that we do the right thing if the
|
||||
* same SharedWorker is used first from an secure context and then from
|
||||
* an insecure context.
|
||||
*
|
||||
* To do this, we load a subframe which loads a SharedWorker
|
||||
* and communicates back to us whether that worker and a child dedicated
|
||||
* worker it spawns think they are secure contexts. Async tests t1 and t2
|
||||
* track these two workers.
|
||||
*
|
||||
* After we have heard from both workers in the subframe, we open an
|
||||
* insecure (http) popup, which loads the same exact subframe. This
|
||||
* subframe is still is same-origin with
|
||||
* us but not a secure context, since its parent is http, not https. Then
|
||||
* we wait to hear about the status of the workers in the popup's
|
||||
* subframe. Async tests t3 and t4 track these two workers.
|
||||
*
|
||||
*/
|
||||
var t1 = async_test("Shared worker in subframe");
|
||||
var t2 = async_test("Nested worker in shared worker in subframe");
|
||||
var t3 = async_test("Shared worker in popup");
|
||||
var t4 = async_test("Nested worker from shared worker in popup");
|
||||
|
||||
var messageCount = 0;
|
||||
var popup = null;
|
||||
onmessage = function(e) {
|
||||
++messageCount;
|
||||
if (messageCount == 4 && popup) {
|
||||
popup.close();
|
||||
}
|
||||
var data = e.data;
|
||||
if (data.type == "shared") {
|
||||
// This is a message from our shared worker; check whether it's the
|
||||
// one in the popup or in our subframe.
|
||||
if (data.fromPopup) {
|
||||
t3.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_true(data.error);
|
||||
});
|
||||
t3.done();
|
||||
} else {
|
||||
t1.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_false(data.error);
|
||||
assert_true(data.isSecureContext);
|
||||
});
|
||||
t1.done();
|
||||
}
|
||||
} else if (data.type == "nested") {
|
||||
// This is a message from our shared worker's nested dedicated worker;
|
||||
// check whether it's the one in the popup or in our subframe.
|
||||
if (data.fromPopup) {
|
||||
t4.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_true(data.error);
|
||||
});
|
||||
t4.done();
|
||||
} else {
|
||||
t2.step(function() {
|
||||
assert_false(data.exception);
|
||||
assert_false(data.error);
|
||||
assert_true(data.isSecureContext);
|
||||
});
|
||||
t2.done();
|
||||
}
|
||||
} else {
|
||||
if (popup) {
|
||||
popup.close();
|
||||
}
|
||||
t1.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t1.done();
|
||||
t2.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t2.done();
|
||||
t3.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t3.done();
|
||||
t4.step(function() {
|
||||
assert_unreached("Unknown message");
|
||||
});
|
||||
t4.done();
|
||||
}
|
||||
|
||||
if (messageCount == 2) {
|
||||
// Got both messages from our child; time to open our popup
|
||||
popup = window.open(http_dir + "support/shared-worker-insecure-popup.html?https_dir4");
|
||||
}
|
||||
}
|
||||
|
||||
var ifr = document.createElement("iframe");
|
||||
ifr.src = https_dir4 + "support/https-subframe-shared.html";
|
||||
document.body.appendChild(ifr);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1 @@
|
|||
postMessage(isSecureContext);
|
|
@ -0,0 +1,21 @@
|
|||
<!DOCTYPE html>
|
||||
<script src="../server-locations.sub.js"></script>
|
||||
<script>
|
||||
var w1 = new Worker(http_dir + "support/dedicated-worker-script.js");
|
||||
w1.onmessage = function(e) {
|
||||
parent.postMessage({ type: "http", error: false,
|
||||
isSecureContext: e.data }, "*");
|
||||
};
|
||||
w1.onerror = function(e) {
|
||||
parent.postMessage({ type: "http", error: true }, "*");
|
||||
};
|
||||
|
||||
var w2 = new Worker(https_dir + "support/dedicated-worker-script.js");
|
||||
w2.onmessage = function(e) {
|
||||
parent.postMessage({ type: "https", error: false,
|
||||
isSecureContext: e.data }, "*");
|
||||
};
|
||||
w2.onerror = function(e) {
|
||||
parent.postMessage({ type: "https", error: true }, "*");
|
||||
}
|
||||
</script>
|
|
@ -0,0 +1,32 @@
|
|||
<!DOCTYPE html>
|
||||
<script>
|
||||
try {
|
||||
var w = new SharedWorker("shared-worker-script.js");
|
||||
w.port.onmessage = function(e) {
|
||||
parent.postMessage({ type: "shared", error: false, exception: false,
|
||||
isSecureContext: e.data }, "*");
|
||||
};
|
||||
w.onerror = function(e) {
|
||||
parent.postMessage({ type: "shared", error: true, exception: false },
|
||||
"*");
|
||||
}
|
||||
w.port.start();
|
||||
} catch (e) {
|
||||
parent.postMessage({ type: "shared", exception: true }, "*");
|
||||
}
|
||||
|
||||
try {
|
||||
var w = new SharedWorker("parent-shared-worker-script.js");
|
||||
w.port.onmessage = function(e) {
|
||||
parent.postMessage({ type: "nested", error: false, exception: false,
|
||||
isSecureContext: e.data }, "*");
|
||||
};
|
||||
w.onerror = function(e) {
|
||||
parent.postMessage({ type: "nested", error: true, exception: false },
|
||||
"*");
|
||||
}
|
||||
w.port.start();
|
||||
} catch (e) {
|
||||
parent.postMessage({ type: "nested", exception: true }, "*");
|
||||
}
|
||||
</script>
|
|
@ -0,0 +1,4 @@
|
|||
var w = new Worker("dedicated-worker-script.js");
|
||||
w.onmessage = function (e) {
|
||||
postMessage(e.data);
|
||||
}
|
|
@ -0,0 +1,8 @@
|
|||
addEventListener("connect", function (e) {
|
||||
var port = e.ports[0];
|
||||
port.start();
|
||||
var w = new Worker("dedicated-worker-script.js");
|
||||
w.onmessage = function (e) {
|
||||
port.postMessage(e.data);
|
||||
}
|
||||
});
|
|
@ -0,0 +1,15 @@
|
|||
<!DOCTYPE html>
|
||||
<script src="../server-locations.sub.js"></script>
|
||||
<body>
|
||||
<script>
|
||||
var url = self[location.search.substr(1)] + "support/https-subframe-shared.html";
|
||||
onmessage = function(e) {
|
||||
var data = e.data;
|
||||
data.fromPopup = true;
|
||||
opener.postMessage(data, "*");
|
||||
}
|
||||
var ifr = document.createElement("iframe");
|
||||
ifr.src = url;
|
||||
document.body.appendChild(ifr);
|
||||
</script>
|
||||
</body>
|
|
@ -0,0 +1,5 @@
|
|||
addEventListener("connect", function (e) {
|
||||
var port = e.ports[0];
|
||||
port.start();
|
||||
port.postMessage(isSecureContext);
|
||||
});
|
Loading…
Add table
Add a link
Reference in a new issue