aboutsummaryrefslogtreecommitdiffstats
path: root/tests/wpt/web-platform-tests/native-file-system/script-tests/FileSystemBaseHandle-postMessage-Error.js
diff options
context:
space:
mode:
authorWPT Sync Bot <josh+wptsync@joshmatthews.net>2019-11-17 10:33:25 +0000
committerWPT Sync Bot <josh+wptsync@joshmatthews.net>2019-11-17 14:10:26 +0000
commitea00d3409848c98dd7399853a131a59c100b7d46 (patch)
treebab52e6144f869eff35944b55ad25979633e88b8 /tests/wpt/web-platform-tests/native-file-system/script-tests/FileSystemBaseHandle-postMessage-Error.js
parent39963266ae842d37ceff1502a2936b4acbf9037d (diff)
downloadservo-ea00d3409848c98dd7399853a131a59c100b7d46.tar.gz
servo-ea00d3409848c98dd7399853a131a59c100b7d46.zip
Update web-platform-tests to revision 89aa3f42131cce5a77268ddaeb2fab8a2e29c2a6
Diffstat (limited to 'tests/wpt/web-platform-tests/native-file-system/script-tests/FileSystemBaseHandle-postMessage-Error.js')
-rw-r--r--tests/wpt/web-platform-tests/native-file-system/script-tests/FileSystemBaseHandle-postMessage-Error.js36
1 files changed, 4 insertions, 32 deletions
diff --git a/tests/wpt/web-platform-tests/native-file-system/script-tests/FileSystemBaseHandle-postMessage-Error.js b/tests/wpt/web-platform-tests/native-file-system/script-tests/FileSystemBaseHandle-postMessage-Error.js
index 914b47bcf40..c4ae8363cc5 100644
--- a/tests/wpt/web-platform-tests/native-file-system/script-tests/FileSystemBaseHandle-postMessage-Error.js
+++ b/tests/wpt/web-platform-tests/native-file-system/script-tests/FileSystemBaseHandle-postMessage-Error.js
@@ -182,28 +182,14 @@ directory_test(async (t, root_dir) => {
t, root_dir, /*receiver=*/self, /*target=*/iframe.contentWindow,
/*target_origin=*/'*', /*expected_has_source*/true,
/*expected_origin=*/location.origin);
-
- // https://crbug.com/1014248 Should sandboxed iframes expose the
- // NativeFileSystem?
- //
- // await do_receive_message_error_test(
- // t, /*receiver=*/self, /*target=*/iframe.contentWindow,
- // /*target_origin=*/'*', /*expected_has_source=*/true,
- // /*expected_origin=*/kRemoteOrigin);
-}, 'Fail to send and receive messages using a sandboxed iframe.');
+}, 'Fail to send to a sandboxed iframe.');
directory_test(async (t, root_dir) => {
const iframe = await add_iframe(
t, { src: kDocumentMessageTarget, sandbox: 'allow-scripts' });
await do_send_message_port_error_test(
t, root_dir, /*target=*/iframe.contentWindow, /*target_origin=*/'*');
-
- // https://crbug.com/1014248 Should sandboxed iframes expose the
- // NativeFileSystem?
- //
- // await do_receive_message_port_error_test(
- // t, /*target=*/iframe.contentWindow, /*target_origin=*/'*');
-}, 'Fail to send and receive messages using a message port in a sandboxed ' +
+}, 'Fail to send messages using a message port to a sandboxed ' +
'iframe.');
directory_test(async (t, root_dir) => {
@@ -246,15 +232,7 @@ directory_test(async (t, root_dir) => {
t, root_dir, /*receiver=*/self, /*target=*/child_window,
/*target_origin=*/'*', /*expected_has_source*/true,
/*expected_origin=*/location.origin);
-
- // https://crbug.com/1014248 Should sandboxed windows expose the
- // NativeFileSystem?
- //
- // await do_receive_message_error_test(
- // t, /*receiver=*/self, /*target=*/child_window,
- // /*target_origin=*/'*', /*expected_has_source=*/true,
- // /*expected_origin=*/kRemoteOrigin);
-}, 'Fail to send and receive messages using a sandboxed window.');
+}, 'Fail to send messages to a sandboxed window.');
directory_test(async (t, root_dir) => {
const url = `${kDocumentMessageTarget}?pipe=header(Content-Security-Policy` +
@@ -262,11 +240,5 @@ directory_test(async (t, root_dir) => {
const child_window = await open_window(t, url);
await do_send_message_port_error_test(
t, root_dir, /*target=*/child_window, /*target_origin=*/'*');
-
- // https://crbug.com/1014248 Should sandboxed windows expose the
- // NativeFileSystem?
- //
- // await do_receive_message_port_error_test(
- // t, /*target=*/child_window, /*target_origin=*/'*');
-}, 'Fail to send and receive messages using a message port in a sandboxed ' +
+}, 'Fail to send messages using a message port to a sandboxed ' +
'window.');