Bug 1453713 [wpt PR 10448] - Fix incorrect unreachable_func in CSP layout tests., a=testonly
authorAlex Moshchuk <alexmos@chromium.org>
Fri, 27 Apr 2018 20:53:06 +0000
changeset 469747 920a5f796af2f3628ebb39a52aff4fc178d6e8b0
parent 469746 bfa2755e73afbdac239ebd7e5cd55e9293d0d102
child 469748 c5ec60ab9ea8d8152e3989e3c8f6233dfe41cf18
push id9174
push userarchaeopteryx@coole-files.de
push dateMon, 30 Apr 2018 15:33:30 +0000
treeherdermozilla-beta@1b1a8ab75f1f [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewerstestonly
bugs1453713, 10448, 999182, 1010473, 552077
milestone61.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1453713 [wpt PR 10448] - Fix incorrect unreachable_func in CSP layout tests., a=testonly Automatic update from web-platform-testsFix incorrect unreachable_func in CSP layout tests. Credit goes to nick@ for spotting it in https://chromium-review.googlesource.com/c/chromium/src/+/999182 Change-Id: I278234762e4ca8ced592c0b63636c6dc6b981e6f Reviewed-on: https://chromium-review.googlesource.com/1010473 Reviewed-by: Nick Carter <nick@chromium.org> Commit-Queue: Nick Carter <nick@chromium.org> Cr-Commit-Position: refs/heads/master@{#552077} -- wpt-commits: 98241148db34f94d9ba2d159ccd62befe5c25078 wpt-pr: 10448
testing/web-platform/meta/MANIFEST.json
testing/web-platform/tests/content-security-policy/embedded-enforcement/support/testharness-helper.sub.js
--- a/testing/web-platform/meta/MANIFEST.json
+++ b/testing/web-platform/meta/MANIFEST.json
@@ -423798,17 +423798,17 @@
    "363e06143474e3a3941fe4b96631146902351aff",
    "support"
   ],
   "content-security-policy/embedded-enforcement/support/echo-required-csp.py": [
    "8d73332cdc154e05cdfa936d3f6b936b9c0ebdba",
    "support"
   ],
   "content-security-policy/embedded-enforcement/support/testharness-helper.sub.js": [
-   "3f5930842625b190576a163cbe1a01aa8fc4c086",
+   "009dfb8482f20ce57121406d675fa83315cbd2d6",
    "support"
   ],
   "content-security-policy/font-src/font-match-allowed.sub.html": [
    "4bc23af2a5a3280630e50cc4c35a9769e499b7a6",
    "testharness"
   ],
   "content-security-policy/font-src/font-mismatch-blocked.sub.html": [
    "274372eb59cca6e399d8c786d7a0f443c6f35254",
--- a/testing/web-platform/tests/content-security-policy/embedded-enforcement/support/testharness-helper.sub.js
+++ b/testing/web-platform/tests/content-security-policy/embedded-enforcement/support/testharness-helper.sub.js
@@ -113,17 +113,17 @@ function assert_iframe_with_csp(t, url, 
         loaded[e.data["id"]] = true;
   });
 
   if (shouldBlock) {
     // Assert iframe does not load and is inaccessible.
     window.onmessage = function (e) {
       if (e.source != i.contentWindow)
           return;
-      t.unreached_func('No message should be sent from the frame.');
+      t.assert_unreached('No message should be sent from the frame.');
     }
     i.onload = t.step_func(function () {
       // Delay the check until after the postMessage has a chance to execute.
       setTimeout(t.step_func_done(function () {
         assert_equals(loaded[urlId], undefined);
       }), 1);
       assert_throws("SecurityError", () => {
         var x = i.contentWindow.location.href;