зеркало из https://github.com/mozilla/gecko-dev.git
248 строки
8.3 KiB
HTML
248 строки
8.3 KiB
HTML
<!DOCTYPE HTML>
|
|
<html>
|
|
<head>
|
|
<title>Test Error Reporting of Service Worker Failures</title>
|
|
<script src="/tests/SimpleTest/SimpleTest.js"></script>
|
|
<script src="error_reporting_helpers.js"></script>
|
|
<script src="utils.js"></script>
|
|
<link rel="stylesheet" href="/tests/SimpleTest/test.css"/>
|
|
<meta http-equiv="Content-type" content="text/html;charset=UTF-8">
|
|
</head>
|
|
<body>
|
|
|
|
<script type="text/javascript">
|
|
"use strict";
|
|
|
|
/**
|
|
* Test that a bunch of service worker coding errors and failure modes that
|
|
* might otherwise be hard to diagnose are surfaced as console error messages.
|
|
* The driving use-case is minimizing cursing from a developer looking at a
|
|
* document in Firefox testing a page that involves service workers.
|
|
*
|
|
* This test assumes that errors will be reported via
|
|
* ServiceWorkerManager::ReportToAllClients and that that method is reliable and
|
|
* tested via some other file.
|
|
**/
|
|
|
|
add_task(function setupPrefs() {
|
|
return SpecialPowers.pushPrefEnv({"set": [
|
|
["dom.serviceWorkers.enabled", true],
|
|
["dom.serviceWorkers.testing.enabled", true],
|
|
["dom.caches.testing.enabled", true],
|
|
]});
|
|
});
|
|
|
|
/**
|
|
* Ensure an error is logged during the initial registration of a SW when a 404
|
|
* is received.
|
|
*/
|
|
add_task(async function register_404() {
|
|
// Start monitoring for the error
|
|
let expectedMessage = expect_console_message(
|
|
"ServiceWorkerRegisterNetworkError",
|
|
[make_absolute_url("network_error/"), "404", make_absolute_url("404.js")]);
|
|
|
|
// Register, generating the 404 error. This will reject with a TypeError
|
|
// which we need to consume so it doesn't get thrown at our generator.
|
|
await navigator.serviceWorker.register("404.js", { scope: "network_error/" })
|
|
.then(
|
|
() => { ok(false, "should have rejected"); },
|
|
(e) => { ok(e.name === "TypeError", "404 failed as expected"); });
|
|
|
|
await wait_for_expected_message(expectedMessage);
|
|
});
|
|
|
|
/**
|
|
* Ensure an error is logged when the service worker is being served with a
|
|
* MIME type of text/plain rather than a JS type.
|
|
*/
|
|
add_task(async function register_bad_mime_type() {
|
|
let expectedMessage = expect_console_message(
|
|
"ServiceWorkerRegisterMimeTypeError2",
|
|
[make_absolute_url("bad_mime_type/"), "text/plain",
|
|
make_absolute_url("sw_bad_mime_type.js")]);
|
|
|
|
// consume the expected rejection so it doesn't get thrown at us.
|
|
await navigator.serviceWorker.register("sw_bad_mime_type.js", { scope: "bad_mime_type/" })
|
|
.then(
|
|
() => { ok(false, "should have rejected"); },
|
|
(e) => { ok(e.name === "SecurityError", "bad MIME type failed as expected"); });
|
|
|
|
await wait_for_expected_message(expectedMessage);
|
|
});
|
|
|
|
async function notAllowStorageAccess() {
|
|
return SpecialPowers.pushPrefEnv({"set": [
|
|
["network.cookie.lifetimePolicy",
|
|
SpecialPowers.Ci.nsICookieService.ACCEPT_SESSION],
|
|
]});
|
|
}
|
|
|
|
async function allowStorageAccess() {
|
|
return SpecialPowers.pushPrefEnv({"set": [
|
|
["network.cookie.lifetimePolicy",
|
|
SpecialPowers.Ci.nsICookieService.ACCEPT_NORMALLY],
|
|
]});
|
|
}
|
|
|
|
/**
|
|
* Ensure an error is logged when the storage is not allowed and the content
|
|
* script is trying to register a service worker.
|
|
*/
|
|
add_task(async function register_storage_error() {
|
|
let expectedMessage = expect_console_message(
|
|
"ServiceWorkerRegisterStorageError",
|
|
[make_absolute_url("storage_not_allow/")]);
|
|
|
|
await notAllowStorageAccess();
|
|
|
|
// consume the expected rejection so it doesn't get thrown at us.
|
|
await navigator.serviceWorker.register("sw_storage_not_allow.js",
|
|
{ scope: "storage_not_allow/" })
|
|
.then(
|
|
() => { ok(false, "should have rejected"); },
|
|
(e) => { ok(e.name === "SecurityError",
|
|
"storage access failed as expected."); });
|
|
|
|
await wait_for_expected_message(expectedMessage);
|
|
|
|
await allowStorageAccess();
|
|
});
|
|
|
|
/**
|
|
* Ensure an error is logged when the storage is not allowed and the content
|
|
* script is trying to get the service worker registration.
|
|
*/
|
|
add_task(async function get_registration_storage_error() {
|
|
let expectedMessage =
|
|
expect_console_message("ServiceWorkerGetRegistrationStorageError", []);
|
|
|
|
await notAllowStorageAccess();
|
|
|
|
// consume the expected rejection so it doesn't get thrown at us.
|
|
await navigator.serviceWorker.getRegistration()
|
|
.then(
|
|
() => { ok(false, "should have rejected"); },
|
|
(e) => { ok(e.name === "SecurityError",
|
|
"storage access failed as expected."); });
|
|
|
|
await wait_for_expected_message(expectedMessage);
|
|
|
|
await allowStorageAccess();
|
|
});
|
|
|
|
/**
|
|
* Ensure an error is logged when the storage is not allowed and the content
|
|
* script is trying to get the service worker registrations.
|
|
*/
|
|
add_task(async function get_registrations_storage_error() {
|
|
let expectedMessage =
|
|
expect_console_message("ServiceWorkerGetRegistrationStorageError", []);
|
|
|
|
await notAllowStorageAccess();
|
|
|
|
// consume the expected rejection so it doesn't get thrown at us.
|
|
await navigator.serviceWorker.getRegistrations()
|
|
.then(
|
|
() => { ok(false, "should have rejected"); },
|
|
(e) => { ok(e.name === "SecurityError",
|
|
"storage access failed as expected."); });
|
|
|
|
await wait_for_expected_message(expectedMessage);
|
|
|
|
await allowStorageAccess();
|
|
});
|
|
|
|
/**
|
|
* Ensure an error is logged when the storage is not allowed and the content
|
|
* script is trying to post a message to the service worker.
|
|
*/
|
|
add_task(async function postMessage_storage_error() {
|
|
let expectedMessage = expect_console_message(
|
|
"ServiceWorkerPostMessageStorageError",
|
|
[make_absolute_url("storage_not_allow/")]);
|
|
|
|
let registration;
|
|
// consume the expected rejection so it doesn't get thrown at us.
|
|
await navigator.serviceWorker.register("sw_storage_not_allow.js",
|
|
{ scope: "storage_not_allow/" })
|
|
.then(reg => { registration = reg; })
|
|
.then(() => notAllowStorageAccess())
|
|
.then(() => registration.installing ||
|
|
registration.waiting ||
|
|
registration.active)
|
|
.then(worker => worker.postMessage('ha'))
|
|
.then(
|
|
() => { ok(false, "should have rejected"); },
|
|
(e) => { ok(e.name === "SecurityError",
|
|
"storage access failed as expected."); });
|
|
|
|
await wait_for_expected_message(expectedMessage);
|
|
|
|
await registration.unregister();
|
|
await allowStorageAccess();
|
|
});
|
|
|
|
/**
|
|
* Ensure an error is logged when the storage is not allowed and the service
|
|
* worker is trying to get its client.
|
|
*/
|
|
add_task(async function get_client_storage_error() {
|
|
let expectedMessage =
|
|
expect_console_message("ServiceWorkerGetClientStorageError", []);
|
|
|
|
await SpecialPowers.pushPrefEnv({"set": [
|
|
// Make the test pass the IsOriginPotentiallyTrustworthy.
|
|
["dom.securecontext.whitelist", "mochi.test"]
|
|
]});
|
|
|
|
let registration;
|
|
// consume the expected rejection so it doesn't get thrown at us.
|
|
await navigator.serviceWorker.register("sw_storage_not_allow.js",
|
|
{ scope: "test_error_reporting.html" })
|
|
.then(reg => {
|
|
registration = reg;
|
|
return waitForState(registration.installing, "activated");
|
|
})
|
|
// Get the client's ID in the stage 1
|
|
.then(() => fetch("getClient-stage1"))
|
|
.then(() => notAllowStorageAccess())
|
|
// Trigger the clients.get() in the stage 2
|
|
.then(() => fetch("getClient-stage2"))
|
|
.catch(e => ok(false, "fail due to:" + e));
|
|
|
|
await wait_for_expected_message(expectedMessage);
|
|
|
|
await registration.unregister();
|
|
await allowStorageAccess();
|
|
});
|
|
|
|
/**
|
|
* Ensure an error is logged when the storage is not allowed and the service
|
|
* worker is trying to get its clients.
|
|
*/
|
|
add_task(async function get_clients_storage_error() {
|
|
let expectedMessage =
|
|
expect_console_message("ServiceWorkerGetClientStorageError", []);
|
|
|
|
let registration;
|
|
// consume the expected rejection so it doesn't get thrown at us.
|
|
await navigator.serviceWorker.register("sw_storage_not_allow.js",
|
|
{ scope: "test_error_reporting.html" })
|
|
.then(reg => {
|
|
registration = reg;
|
|
return waitForState(registration.installing, "activated");
|
|
})
|
|
.then(() => notAllowStorageAccess())
|
|
.then(() => fetch("getClients"))
|
|
.catch(e => ok(false, "fail due to:" + e));
|
|
|
|
await wait_for_expected_message(expectedMessage);
|
|
|
|
await registration.unregister();
|
|
await allowStorageAccess();
|
|
});
|
|
</script>
|
|
</body>
|
|
</html>
|