tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

006.html (1336B)


      1 <!doctype html>
      2 <title>WebSockets: setting Secure cookie with document.cookie, checking ws request</title>
      3 <script src=/resources/testharness.js></script>
      4 <script src=/resources/testharnessreport.js></script>
      5 <script src=../constants.sub.js></script>
      6 <meta name="variant" content="?default">
      7 <meta name="variant" content="?wss&wpt_flags=https">
      8 <meta name="variant" content="?wpt_flags=h2">
      9 <div id=log></div>
     10 <script>
     11 var cookie_id = ((new Date())-0) + '.' + Math.random();
     12 async_test(function(t) {
     13  if (window.WebSocket) {
     14    document.cookie = 'ws_test_'+cookie_id+'=test; Path=/; Secure';
     15  }
     16  t.add_cleanup(function() {
     17    // remove cookie
     18    document.cookie = 'ws_test_'+cookie_id+'=; Path=/; Secure; Expires=Sun, 06 Nov 1994 08:49:37 GMT';
     19  });
     20  var ws = new WebSocket(SCHEME_DOMAIN_PORT+'/echo-cookie');
     21  ws.onmessage = t.step_func(function(e) {
     22    ws.close();
     23    var cookie_was_seen = e.data.indexOf('ws_test_'+cookie_id+'=test') != -1;
     24    if (SCHEME_DOMAIN_PORT.substr(0,3) == 'wss') {
     25      assert_true(cookie_was_seen,
     26                  'cookie should have been visible to wss');
     27    } else {
     28      assert_false(cookie_was_seen,
     29                   'cookie should not have been visible to ws');
     30    }
     31    t.done();
     32  })
     33  ws.onerror = ws.onclose = t.step_func(function(e) {assert_unreached(e.type)});
     34 });
     35 </script>