mirror of
https://github.com/servo/servo.git
synced 2025-08-16 10:55:34 +01:00
Update web-platform-tests to revision dc5cbf088edcdb266541d4e5a76149a2c6e716a0
This commit is contained in:
parent
1d40075f03
commit
079092dfea
2381 changed files with 90360 additions and 17722 deletions
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -1,41 +0,0 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<meta http-equiv="Content-Security-Policy" content="referrer unsafe-url">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the meta-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "meta-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
Loading…
Add table
Add a link
Reference in a new issue